a6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64", 0xf4) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="57317bb142", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r5 = accept$alg(r4, 0x0, 0x0) sendmsg$alg(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) dup(r1) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r9, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r10, 0x0, 0x0) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f00000000c0)="3609c260f5d1cef0209d3c005f00"/24, 0x18) accept$alg(r8, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r12 = accept$alg(r11, 0x0, 0x0) sendmsg$alg(r12, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r12, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r12, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r13 = dup2(r7, r12) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = dup2(r13, r14) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r15, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r16, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r16, &(0x7f0000000080), 0x1c) r17 = dup2(r16, r16) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = dup2(r17, r18) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r19, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x200000) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r20, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r20, &(0x7f0000000080), 0x1c) r21 = dup2(r20, r20) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r21, r22) r23 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r23, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r23, &(0x7f0000000080), 0x1c) r24 = dup2(r23, r23) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r24, r25) ioctl$PPPIOCGUNIT(r24, 0x80047456, &(0x7f00000001c0)) 07:25:47 executing program 4 (fault-call:6 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1212.613745][T16629] FAULT_INJECTION: forcing a failure. [ 1212.613745][T16629] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.626444][T16629] CPU: 0 PID: 16629 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1212.635292][T16629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.645457][T16629] Call Trace: [ 1212.648772][T16629] dump_stack+0x11d/0x187 [ 1212.653151][T16629] should_fail.cold+0x5/0xf [ 1212.657688][T16629] __should_failslab+0x82/0xb0 [ 1212.662473][T16629] should_failslab+0x5/0xf [ 1212.666914][T16629] kmem_cache_alloc+0x23/0x5e0 [ 1212.671704][T16629] ? iov_iter_advance+0x21c/0x900 [ 1212.676763][T16629] __build_skb+0x37/0x80 [ 1212.681030][T16629] __napi_alloc_skb+0x185/0x210 [ 1212.686022][T16629] napi_get_frags+0x5a/0xa0 [ 1212.690682][T16629] tun_get_user+0x61e/0x25e0 [ 1212.695321][T16629] tun_chr_write_iter+0x75/0xc0 [ 1212.700226][T16629] new_sync_write+0x303/0x400 [ 1212.704932][T16629] __vfs_write+0x9e/0xb0 [ 1212.709195][T16629] vfs_write+0x189/0x380 [ 1212.713454][T16629] ksys_write+0xc5/0x1a0 [ 1212.717819][T16629] __x64_sys_write+0x49/0x60 [ 1212.722524][T16629] do_syscall_64+0xc7/0x390 [ 1212.727048][T16629] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1212.733123][T16629] RIP: 0033:0x45c479 [ 1212.737031][T16629] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:25:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64", 0xf4) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1212.757267][T16629] RSP: 002b:00007fca5bd16c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1212.765685][T16629] RAX: ffffffffffffffda RBX: 00007fca5bd176d4 RCX: 000000000045c479 [ 1212.773662][T16629] RDX: 00000000000000d6 RSI: 00000000200013c0 RDI: 0000000000000003 [ 1212.781652][T16629] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1212.789652][T16629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1212.797634][T16629] R13: 0000000000000d0b R14: 00000000004cef5f R15: 0000000000000000 07:25:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="57317bb142", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r5 = accept$alg(r4, 0x0, 0x0) sendmsg$alg(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) dup(r1) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r9, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r10, 0x0, 0x0) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f00000000c0)="3609c260f5d1cef0209d3c005f00"/24, 0x18) accept$alg(r8, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r12 = accept$alg(r11, 0x0, 0x0) sendmsg$alg(r12, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r12, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r12, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r13 = dup2(r7, r12) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = dup2(r13, r14) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r15, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r16, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r16, &(0x7f0000000080), 0x1c) r17 = dup2(r16, r16) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = dup2(r17, r18) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r19, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x200000) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r20, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r20, &(0x7f0000000080), 0x1c) r21 = dup2(r20, r20) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r21, r22) r23 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r23, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r23, &(0x7f0000000080), 0x1c) r24 = dup2(r23, r23) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r24, r25) ioctl$PPPIOCGUNIT(r24, 0x80047456, &(0x7f00000001c0)) 07:25:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 07:25:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="57317bb142", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r5 = accept$alg(r4, 0x0, 0x0) sendmsg$alg(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) dup(r1) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r9, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r10, 0x0, 0x0) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f00000000c0)="3609c260f5d1cef0209d3c005f00"/24, 0x18) accept$alg(r8, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r12 = accept$alg(r11, 0x0, 0x0) sendmsg$alg(r12, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r12, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r12, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r13 = dup2(r7, r12) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = dup2(r13, r14) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r15, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r16, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r16, &(0x7f0000000080), 0x1c) r17 = dup2(r16, r16) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = dup2(r17, r18) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r19, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x200000) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r20, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r20, &(0x7f0000000080), 0x1c) r21 = dup2(r20, r20) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r21, r22) r23 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r23, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r23, &(0x7f0000000080), 0x1c) r24 = dup2(r23, r23) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r24, r25) ioctl$PPPIOCGUNIT(r24, 0x80047456, &(0x7f00000001c0)) 07:25:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:48 executing program 4 (fault-call:6 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19", 0xf8) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:49 executing program 0 (fault-call:6 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19", 0xf8) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000e00"}, 0x1c) 07:25:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:49 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19", 0xf8) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfa) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0xf) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="020000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000f00"}, 0x1c) 07:25:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfa) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:51 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_recover='errors=recover', 0xa}]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="080000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfa) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x44001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'wg0\x00', {0x7, 0x4e21, @remote}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffffffffffffe2) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345070000000000000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000001000"}, 0x1c) 07:25:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2e8183, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="430500009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000ee175124d1cf149c0d72d03efd98fde7e98d88c320d7e48bc1647bd6248cf5940c292a8a331de2c65ce6e9e5e18ce24bc19e2a8b46c6481572756d2a9b618fbba564d28963985b3ee5844a4eae01d08771a53e8a71db66bbb78ffefc95e6900552e435e6a2dc9d97482f065a0e669dbf28f586a52b9bcca78cee52577ab33cb27a3954ef5ee8bb5dd88b9a32ba131ae47b81d83d173bf8879babe472294d8b7670733839be3ce28247658e175f1d17d4fe3b141448cd283371dbd197227b0cfb642a7bd17506a3460653a5598b1476562e03a8635b8287e4d8f2a17895212c7c91f7"], 0xd6) 07:25:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="080600009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000001100"}, 0x1c) 07:25:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r5) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000980)={0x4, 0x8000, 0x6, r7, 0x0, &(0x7f0000000940)={0x980902, 0x2, [], @ptr=0x1ff}}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000080), 0x1c) r9 = dup2(r8, r8) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r10) r11 = pidfd_getfd(r9, r1, 0x0) setsockopt$inet6_tcp_int(r11, 0x6, 0x14, &(0x7f0000000280)=0x10000002, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r12 = dup2(r2, r2) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r13) ioctl$TIOCGSID(r12, 0x5429, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) r14 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x101000, 0x0) connect$inet6(r14, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r15 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r15, r16) setsockopt$bt_BT_SECURITY(r15, 0x112, 0x4, &(0x7f0000000040)={0xf2, 0x4}, 0x2) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86fb604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="890600009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r3) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ptrace$getsig(0x4202, r5, 0x20, &(0x7f0000000340)) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0xf) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000080), 0x1c) r7 = dup2(r6, r6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$FS_IOC_GETFSLABEL(r9, 0x81009431, &(0x7f0000000180)) dup2(r7, r8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x28, &(0x7f00000000c0)}, 0x10) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e82c4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000001700"}, 0x1c) 07:25:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="060800009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x800, 0x8000) ioctl$NBD_DISCONNECT(r1, 0xab08) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) r5 = openat(r3, &(0x7f00000000c0)='./file0\x00', 0x1, 0x141) getsockopt$CAN_RAW_FD_FRAMES(r5, 0x65, 0x5, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = socket$netlink(0x10, 0x3, 0x5) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000140)={{0x3, 0x0, 0x4, 0x5, '\x00', 0x7fffffff}, 0x0, [0x80000000, 0x1ff, 0xed, 0x401, 0x8, 0x1, 0x3, 0x6, 0xf92a, 0x400, 0x687, 0x8000000000000000, 0x400, 0x4, 0x5, 0xa88, 0x20000, 0x1000, 0x3833058e, 0xffffffff, 0x7fff, 0x9, 0x2, 0x4, 0x2, 0x5, 0x4, 0xffff, 0x2, 0x100000000, 0x5, 0x2, 0x6, 0x3, 0x8, 0x4c, 0x3, 0x9, 0xffffffff, 0x2, 0x80000000, 0x100000000, 0x9e0, 0x557c, 0x6, 0x3, 0x3, 0x2, 0x0, 0xf7, 0x4525ec4a, 0x800000000000007, 0x207, 0x800, 0x5, 0x3f, 0x8000005, 0x1, 0x2, 0x7f, 0x8, 0x3, 0x4, 0x20, 0x81, 0x800, 0x400, 0x802, 0x8, 0xffffffffffffffc1, 0x600000000000, 0xba7a, 0x56cd, 0x1, 0xef74, 0x1ff, 0x0, 0x54d, 0xbef, 0xfffffffffffffff7, 0x3, 0x40, 0x7, 0xff, 0x5, 0x1000, 0x400, 0x7fff, 0xb2, 0x8001, 0x7, 0x1, 0x91b1, 0x6, 0x8, 0x1, 0xffffffffffffffff, 0x1ff, 0x0, 0xfea6, 0x0, 0x8001, 0x9, 0x1, 0x1, 0x3, 0xfff, 0xfffffffffffffffd, 0x1, 0x0, 0x10001, 0x20, 0x8, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x35, 0x2, 0x80000000, 0xfffffffffffffffa, 0x10000, 0xfffffffffffffffd, 0xf40000001, 0x7fff, 0x5, 0x5]}) fcntl$notify(r1, 0x402, 0x16) write$tun(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xd6) 07:25:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="800e00009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000021800"}, 0x1c) 07:25:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f0000000240)=""/79) truncate(&(0x7f0000000040)='./file0\x00', 0x5) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000000009f660f57964bbbbbbbbbbbbb86dd60217891e74279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf46721c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e76cc79f1482a87d781d13ac0bfdf290000dc24cc7b1801c442c8e98eedfb129a71c5fafc20894e"], 0xd6) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r5, 0x1, 0x3d, &(0x7f0000000080)={0x0, 0x9}, 0x8) setsockopt$inet_int(r5, 0x0, 0x8, &(0x7f00000000c0)=0x8, 0x4) 07:25:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="803500009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 07:25:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x10, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x20000000) 07:25:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="054300009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 07:25:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x800, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x1000}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000002c0)=ANY=[], 0x0) 07:25:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="884700009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f0000000040)={0xdd, 0x1b, &(0x7f0000000240)="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"}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb049c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa08f5e15759f8db3685b86be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949d0e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aaa39e6fcc79f1482a87d781d13ac0af1800009b2a57195f28df725aa9717cbba5f7c76a8f520f53b8e951862fa33125ab03e1a3d4dd6d4e453067af64d48c23d4324ff7000000"], 0xd6) 07:25:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 07:25:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x66338000) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="884800009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x404e80, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r1, 0x40044104, &(0x7f0000000180)=0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) ioctl$SNDCTL_DSP_GETOPTR(r1, 0x800c5012, &(0x7f0000000240)) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1) dup2(r4, r5) r6 = openat$cgroup_ro(r4, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_type(r6, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) 07:25:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000024000"}, 0x1c) 07:25:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="886400009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:25:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYRESHEX=0x0], 0x1) 07:25:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:25:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 07:25:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0e8000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'wg0\x00', 0x1}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:25:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:25:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078255149510000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7c3f6f5adea9ee668ddd949dd79a06e81f4d3345f1d18048580e000000000000e5dcc46df460b16e378a543bdc1718ac01a4e165a21de0e0320e3e92ecc2525a03b9bdff19b72662e3b0027f98aa83ce4b782613f0247f9f5aa39e6fcc"], 0x1) 07:26:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="358000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000d8f5900"}, 0x1c) 07:26:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000034f7975e00"}, 0x1c) 07:26:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c90780100000000000099ce039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000060be766400"}, 0x1c) 07:26:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="008100009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00C<|v\x00'}, 0x1c) 07:26:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 07:26:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000008000"}, 0x1c) 07:26:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="478800009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = accept(r1, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x3, 0x3}, 0x10) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$SOUND_MIXER_READ_RECSRC(r3, 0x80044dff, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 07:26:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000007d00108000"}, 0x1c) 07:26:02 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="488800009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) 07:26:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r6 = accept$alg(r5, 0x0, 0x0) sendmsg$alg(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r6, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r6, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) write$tun(r3, &(0x7f0000000140)=ANY=[@ANYRES32=r6], 0x1) 07:26:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) 07:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000ffffff8d00"}, 0x1c) 07:26:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="648800009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) 07:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x20002) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000140)=""/202) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000ffffff9100"}, 0x1c) 07:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000002d5a000"}, 0x1c) 07:26:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="068900009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000ffb800"}, 0x1c) 07:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000007dc000"}, 0x1c) 07:26:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) ptrace$setregs(0xf, r2, 0x1f, &(0x7f0000000040)="9707ee73b29d67cd94c279abf14e6f928bd545ec210238feb3670bfef0e5b540fcd4a9f8db0689aecb85eeab3eb11543c6fb005dd2df81b287a5aad5174e") r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) get_robust_list(r3, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000140)={&(0x7f00000000c0)}, 0x0, &(0x7f0000000180)}, &(0x7f0000000240)=0x18) 07:26:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000019f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000007fdc00"}, 0x1c) 07:26:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)=0x7e00000) r2 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x4e23, @rand_addr=0x1f}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r5) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1008000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, 0x4, 0x8, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x41040}, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb00bd0f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06aabb59eb45f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78c589ee55a613f0247f9f5aa39e6fcc79f1482a87e181d13ac0"], 0xd6) 07:26:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000002ee000"}, 0x1c) 07:26:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) 07:26:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000029f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) 07:26:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000003e800"}, 0x1c) 07:26:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) 07:26:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3300a25a", @ANYRES16=r3, @ANYBLOB="050400000000000000007e00000008000f0000000000"], 0x1c}}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) sendmsg$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000240)) r5 = accept4(r2, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000580)=0x80, 0x80800) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000005c0)={0x0, @remote, @empty}, &(0x7f00000004c0)=0xc) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000180)={r6, @dev={0xac, 0x14, 0x14, 0x21}, @loopback}, 0xc) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2400000030943a61d949649b66da8f37cb649f2b10c90ee3d77a501be2255aae9033d57fda7eba633d9f87889f604c73948d4b982ee2a6b19a07ef328e280134aedc9f1a4df351d42d7cf77e72eff666030098acdb5c50a9f3dc9cb7", @ANYRES16=r3, @ANYBLOB="040029bd7000fddbdf252000000008000100ffffffff08000300", @ANYRES32=r6, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x12) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x1, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000080), 0x1c) r9 = dup2(r8, r8) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r9, r10) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r11, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$KVM_SET_SREGS(r11, 0x4138ae84, &(0x7f0000000300)={{0xf000, 0xd000, 0x0, 0x1, 0x20, 0x80, 0xc, 0x1e, 0x2, 0xff, 0x1, 0x9}, {0x6000, 0x0, 0x0, 0x8, 0x30, 0x9, 0x1, 0x6, 0x1, 0x7, 0x4, 0x2}, {0x100000, 0xd000, 0xc, 0x1, 0x3, 0x80, 0x4, 0x7d, 0xfe, 0x3, 0xa7}, {0xf000, 0x3000, 0x8, 0x8b, 0x29, 0x0, 0x60, 0x85, 0x2, 0x3, 0x4, 0x2e}, {0x0, 0x10000, 0x14, 0x8, 0x80, 0x0, 0x1, 0x1, 0xd6, 0x18, 0x0, 0x2}, {0x4000, 0x2000, 0xf, 0x6, 0x0, 0x7, 0x7, 0x5, 0x5, 0x24, 0xff, 0x7}, {0x6000, 0x1, 0x4, 0x6, 0x1, 0x3, 0x80, 0x10, 0x4, 0x0, 0x1f, 0x4}, {0xf000, 0x2, 0x0, 0x80, 0x2, 0x3a, 0xff, 0xff, 0xf8, 0x40, 0x7}, {0x3000, 0x10000}, {0x4, 0xf000}, 0x0, 0x0, 0xb2ca6eb1fe9f0b75, 0x400001, 0xf, 0x1000, 0x2, [0x1f, 0xa0f, 0x3, 0xfffffffffffffffd]}) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000019039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000001f400"}, 0x1c) 07:26:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000089f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000fffffff500"}, 0x1c) 07:26:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="020000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000000fc00"}, 0x1c) 07:26:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xffda) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) fstat(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_xen(&(0x7f00000000c0)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x1000000, &(0x7f0000000300)={'trans=xen,', {[{@cachetag={'cachetag', 0x3d, 'trusted(em0\'ppp1vboxnet0/'}}, {@access_user='access=user'}], [{@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/net/tun\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r1}}, {@permit_directio='permit_directio'}, {@uid_eq={'uid', 0x3d, r2}}, {@fowner_eq={'fowner', 0x3d, r4}}]}}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000080), 0x1c) r7 = dup2(r6, r6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r8) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x20}) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r5, &(0x7f0000000040)=ANY=[@ANYRES16=0x0], 0x1) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r10, &(0x7f0000000080), 0x1c) r11 = dup2(r10, r10) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r13, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r13, &(0x7f0000000080), 0x1c) r14 = dup2(r13, r13) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = dup2(r14, r15) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r16, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) write$FUSE_LK(r16, &(0x7f00000001c0)={0x28, 0x0, 0x6, {{0x4, 0x80000001, 0x1, 0xffffffffffffffff}}}, 0x28) dup2(r11, r12) write$RDMA_USER_CM_CMD_SET_OPTION(r11, &(0x7f0000000440)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000400), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 07:26:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000006089f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'dummy0\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="020000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) 07:26:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19", 0xf8) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000080fe00"}, 0x1c) 07:26:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000005439f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:07 executing program 2 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:07 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3d, &(0x7f0000000080)={0x0, 0x9}, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @local}, 0x1c) r5 = dup2(r4, r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r7, &(0x7f0000000080), 0x1c) r8 = dup2(r7, r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r8, r9) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r10, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$sock_netrom_SIOCDELRT(r10, 0x890c, &(0x7f0000000140)={0x1, @bcast, @netrom={'nr', 0x0}, 0x8001, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, 0x2, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) dup2(r5, r6) ioctl$BLKBSZSET(r5, 0x40081271, &(0x7f0000000040)=0xe7eb) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000004280)={@empty, @remote, 0x0}, &(0x7f00000042c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000004300)={'wg2\x00', r11}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0x1) [ 1232.589194][T24580] FAULT_INJECTION: forcing a failure. [ 1232.589194][T24580] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.608516][T24601] FAULT_INJECTION: forcing a failure. [ 1232.608516][T24601] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.624666][T24580] CPU: 1 PID: 24580 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1232.633659][T24580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.644270][T24580] Call Trace: [ 1232.647621][T24580] dump_stack+0x11d/0x187 [ 1232.652133][T24580] should_fail.cold+0x5/0xf [ 1232.656876][T24580] __should_failslab+0x82/0xb0 [ 1232.661666][T24580] should_failslab+0x5/0xf [ 1232.666245][T24580] __kmalloc+0x54/0x640 [ 1232.670445][T24580] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1232.676783][T24580] ? sock_kmalloc+0xbc/0x110 [ 1232.681819][T24580] ? preempt_count_add+0x63/0x90 [ 1232.686921][T24580] ? __list_del_entry_valid+0x83/0x8e [ 1232.692520][T24580] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1232.698587][T24580] sock_kmalloc+0xbc/0x110 [ 1232.703037][T24580] af_alg_alloc_areq+0x3b/0x130 [ 1232.707911][T24580] aead_recvmsg+0x271/0xd40 [ 1232.712601][T24580] ? aead_release+0x40/0x40 [ 1232.717381][T24580] sock_recvmsg+0x8e/0xb0 [ 1232.721906][T24580] ____sys_recvmsg+0x144/0x350 [ 1232.726787][T24580] ? copy_msghdr_from_user+0x24d/0x320 [ 1232.732626][T24580] ___sys_recvmsg+0xb2/0x100 [ 1232.737331][T24580] ? __fdget+0x29/0x30 [ 1232.741924][T24580] ? sockfd_lookup_light+0xa5/0x100 [ 1232.747470][T24580] __sys_recvmsg+0x98/0x140 [ 1232.752487][T24580] __x64_sys_recvmsg+0x4c/0x60 [ 1232.757439][T24580] do_syscall_64+0xc7/0x390 [ 1232.762067][T24580] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1232.767995][T24580] RIP: 0033:0x45c479 [ 1232.771910][T24580] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1232.792164][T24580] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1232.800826][T24580] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1232.808907][T24580] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1232.816998][T24580] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1232.824976][T24580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1232.833119][T24580] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000000 [ 1232.841293][T24601] CPU: 0 PID: 24601 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1232.850241][T24601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.860876][T24601] Call Trace: [ 1232.864424][T24601] dump_stack+0x11d/0x187 [ 1232.868810][T24601] should_fail.cold+0x5/0xf [ 1232.873390][T24601] __should_failslab+0x82/0xb0 [ 1232.878410][T24601] should_failslab+0x5/0xf [ 1232.883144][T24601] __kmalloc+0x54/0x640 [ 1232.887321][T24601] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1232.893284][T24601] ? sock_kmalloc+0xbc/0x110 [ 1232.897981][T24601] ? preempt_count_add+0x63/0x90 [ 1232.903448][T24601] ? __list_del_entry_valid+0x83/0x8e [ 1232.908892][T24601] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1232.915281][T24601] sock_kmalloc+0xbc/0x110 [ 1232.919845][T24601] af_alg_alloc_areq+0x3b/0x130 [ 1232.924942][T24601] aead_recvmsg+0x271/0xd40 [ 1232.929664][T24601] ? aead_release+0x40/0x40 [ 1232.934402][T24601] sock_recvmsg+0x8e/0xb0 [ 1232.939116][T24601] ____sys_recvmsg+0x144/0x350 [ 1232.943902][T24601] ? copy_msghdr_from_user+0x24d/0x320 [ 1232.949923][T24601] ___sys_recvmsg+0xb2/0x100 [ 1232.954589][T24601] ? __fdget+0x29/0x30 [ 1232.958917][T24601] ? sockfd_lookup_light+0xa5/0x100 [ 1232.964357][T24601] __sys_recvmsg+0x98/0x140 [ 1232.968911][T24601] __x64_sys_recvmsg+0x4c/0x60 [ 1232.973939][T24601] do_syscall_64+0xc7/0x390 [ 1232.978721][T24601] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1232.984897][T24601] RIP: 0033:0x45c479 [ 1232.989001][T24601] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1233.009422][T24601] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1233.017886][T24601] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1233.026220][T24601] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 07:26:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:08 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1233.034212][T24601] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1233.042526][T24601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1233.050675][T24601] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000000 [ 1233.152690][T24795] FAULT_INJECTION: forcing a failure. [ 1233.152690][T24795] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.180389][T24795] CPU: 1 PID: 24795 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1233.189518][T24795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.200171][T24795] Call Trace: [ 1233.203794][T24795] dump_stack+0x11d/0x187 [ 1233.208378][T24795] should_fail.cold+0x5/0xf [ 1233.213234][T24795] __should_failslab+0x82/0xb0 [ 1233.218080][T24795] should_failslab+0x5/0xf [ 1233.222679][T24795] __kmalloc+0x54/0x640 [ 1233.227411][T24795] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1233.233673][T24795] ? sock_kmalloc+0xbc/0x110 [ 1233.238486][T24795] ? preempt_count_add+0x63/0x90 [ 1233.243673][T24795] ? __list_del_entry_valid+0x83/0x8e [ 1233.249190][T24795] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1233.255214][T24795] sock_kmalloc+0xbc/0x110 [ 1233.259770][T24795] af_alg_alloc_areq+0x3b/0x130 [ 1233.264949][T24795] aead_recvmsg+0x271/0xd40 [ 1233.269795][T24795] ? aead_release+0x40/0x40 [ 1233.274331][T24795] sock_recvmsg+0x8e/0xb0 [ 1233.278999][T24795] ____sys_recvmsg+0x144/0x350 [ 1233.284192][T24795] ? copy_msghdr_from_user+0x24d/0x320 [ 1233.290008][T24795] ___sys_recvmsg+0xb2/0x100 [ 1233.295028][T24795] ? __fdget+0x29/0x30 [ 1233.299131][T24795] ? sockfd_lookup_light+0xa5/0x100 [ 1233.304586][T24795] __sys_recvmsg+0x98/0x140 [ 1233.309411][T24795] __x64_sys_recvmsg+0x4c/0x60 [ 1233.314576][T24795] do_syscall_64+0xc7/0x390 [ 1233.319565][T24795] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1233.327475][T24795] RIP: 0033:0x45c479 [ 1233.331740][T24795] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:26:08 executing program 2 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1233.351851][T24795] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1233.360644][T24795] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1233.368638][T24795] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1233.376748][T24795] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1233.385217][T24795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1233.393522][T24795] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000001 07:26:08 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1233.403838][T24798] FAULT_INJECTION: forcing a failure. [ 1233.403838][T24798] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.441799][T24798] CPU: 0 PID: 24798 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1233.450905][T24798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.461066][T24798] Call Trace: [ 1233.464606][T24798] dump_stack+0x11d/0x187 [ 1233.468977][T24798] should_fail.cold+0x5/0xf [ 1233.473667][T24798] __should_failslab+0x82/0xb0 [ 1233.478675][T24798] should_failslab+0x5/0xf [ 1233.480039][T24802] FAULT_INJECTION: forcing a failure. [ 1233.480039][T24802] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.483126][T24798] __kmalloc+0x54/0x640 [ 1233.483163][T24798] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1233.483188][T24798] ? sock_kmalloc+0xbc/0x110 [ 1233.511961][T24798] ? preempt_count_add+0x63/0x90 [ 1233.516923][T24798] ? __list_del_entry_valid+0x83/0x8e [ 1233.522328][T24798] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1233.528368][T24798] sock_kmalloc+0xbc/0x110 [ 1233.533013][T24798] af_alg_alloc_areq+0x3b/0x130 [ 1233.537897][T24798] aead_recvmsg+0x271/0xd40 [ 1233.542683][T24798] ? aead_release+0x40/0x40 [ 1233.547464][T24798] sock_recvmsg+0x8e/0xb0 [ 1233.552073][T24798] ____sys_recvmsg+0x144/0x350 [ 1233.556948][T24798] ? copy_msghdr_from_user+0x24d/0x320 [ 1233.562630][T24798] ___sys_recvmsg+0xb2/0x100 [ 1233.567552][T24798] ? __fdget+0x29/0x30 [ 1233.571935][T24798] ? sockfd_lookup_light+0xa5/0x100 [ 1233.577288][T24798] __sys_recvmsg+0x98/0x140 [ 1233.582001][T24798] __x64_sys_recvmsg+0x4c/0x60 [ 1233.587073][T24798] do_syscall_64+0xc7/0x390 [ 1233.591863][T24798] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1233.597979][T24798] RIP: 0033:0x45c479 [ 1233.602083][T24798] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1233.622234][T24798] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1233.632878][T24798] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1233.641353][T24798] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 07:26:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000c0fe00"}, 0x1c) 07:26:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1233.649857][T24798] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1233.657922][T24798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1233.666186][T24798] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000001 [ 1233.799872][T24802] CPU: 0 PID: 24802 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1233.808765][T24802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.818844][T24802] Call Trace: [ 1233.822230][T24802] dump_stack+0x11d/0x187 [ 1233.826895][T24802] should_fail.cold+0x5/0xf [ 1233.831453][T24802] __should_failslab+0x82/0xb0 [ 1233.836405][T24802] should_failslab+0x5/0xf [ 1233.840954][T24802] __kmalloc+0x54/0x640 [ 1233.845162][T24802] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1233.851352][T24802] ? sock_kmalloc+0xbc/0x110 [ 1233.856158][T24802] ? preempt_count_add+0x63/0x90 [ 1233.861159][T24802] ? __list_del_entry_valid+0x83/0x8e [ 1233.866727][T24802] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1233.872655][T24802] sock_kmalloc+0xbc/0x110 [ 1233.877294][T24802] af_alg_alloc_areq+0x3b/0x130 [ 1233.882472][T24802] aead_recvmsg+0x271/0xd40 [ 1233.887008][T24802] ? aead_release+0x40/0x40 [ 1233.891537][T24802] sock_recvmsg+0x8e/0xb0 [ 1233.895976][T24802] ____sys_recvmsg+0x144/0x350 [ 1233.900865][T24802] ? copy_msghdr_from_user+0x24d/0x320 [ 1233.906701][T24802] ___sys_recvmsg+0xb2/0x100 [ 1233.911820][T24802] ? __fdget+0x29/0x30 [ 1233.916110][T24802] ? sockfd_lookup_light+0xa5/0x100 [ 1233.921450][T24802] __sys_recvmsg+0x98/0x140 [ 1233.926007][T24802] __x64_sys_recvmsg+0x4c/0x60 [ 1233.931022][T24802] do_syscall_64+0xc7/0x390 [ 1233.935604][T24802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1233.941648][T24802] RIP: 0033:0x45c479 [ 1233.945991][T24802] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1233.965762][T24802] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1233.974828][T24802] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1233.983683][T24802] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1233.992398][T24802] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:26:09 executing program 2 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1234.000716][T24802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1234.009002][T24802] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000002 [ 1234.190020][T24820] FAULT_INJECTION: forcing a failure. [ 1234.190020][T24820] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.203500][T24820] CPU: 0 PID: 24820 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1234.212545][T24820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.222732][T24820] Call Trace: [ 1234.226573][T24820] dump_stack+0x11d/0x187 [ 1234.230928][T24820] should_fail.cold+0x5/0xf [ 1234.235478][T24820] __should_failslab+0x82/0xb0 07:26:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="00000e809f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'xfrm0\x00', 0x8000}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000000ff00"}, 0x1c) 07:26:09 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1234.240500][T24820] should_failslab+0x5/0xf [ 1234.244938][T24820] __kmalloc+0x54/0x640 [ 1234.249126][T24820] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1234.255412][T24820] ? sock_kmalloc+0xbc/0x110 [ 1234.260281][T24820] ? preempt_count_add+0x63/0x90 [ 1234.266871][T24820] ? __list_del_entry_valid+0x83/0x8e [ 1234.272523][T24820] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1234.279107][T24820] sock_kmalloc+0xbc/0x110 [ 1234.283841][T24820] af_alg_alloc_areq+0x3b/0x130 [ 1234.288816][T24820] aead_recvmsg+0x271/0xd40 [ 1234.293566][T24820] ? aead_release+0x40/0x40 [ 1234.298132][T24820] sock_recvmsg+0x8e/0xb0 [ 1234.302568][T24820] ____sys_recvmsg+0x144/0x350 [ 1234.307416][T24820] ? copy_msghdr_from_user+0x24d/0x320 [ 1234.312947][T24820] ___sys_recvmsg+0xb2/0x100 [ 1234.317933][T24820] ? __fdget+0x29/0x30 [ 1234.322029][T24820] ? sockfd_lookup_light+0xa5/0x100 [ 1234.327254][T24820] __sys_recvmsg+0x98/0x140 [ 1234.332916][T24820] __x64_sys_recvmsg+0x4c/0x60 07:26:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1234.337791][T24820] do_syscall_64+0xc7/0x390 [ 1234.342546][T24820] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1234.348958][T24820] RIP: 0033:0x45c479 [ 1234.352889][T24820] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1234.373167][T24820] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1234.381727][T24820] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1234.390517][T24820] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1234.398752][T24820] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1234.406799][T24820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1234.414956][T24820] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000002 [ 1234.475783][T24934] FAULT_INJECTION: forcing a failure. [ 1234.475783][T24934] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.491755][T24934] CPU: 0 PID: 24934 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1234.500529][T24934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.510953][T24934] Call Trace: [ 1234.514275][T24934] dump_stack+0x11d/0x187 [ 1234.518936][T24934] should_fail.cold+0x5/0xf [ 1234.523698][T24934] __should_failslab+0x82/0xb0 [ 1234.528632][T24934] should_failslab+0x5/0xf [ 1234.533228][T24934] __kmalloc+0x54/0x640 [ 1234.537436][T24934] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1234.543361][T24934] ? sock_kmalloc+0xbc/0x110 [ 1234.548289][T24934] ? preempt_count_add+0x63/0x90 [ 1234.553458][T24934] ? __list_del_entry_valid+0x83/0x8e [ 1234.558912][T24934] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1234.564840][T24934] sock_kmalloc+0xbc/0x110 [ 1234.569471][T24934] af_alg_alloc_areq+0x3b/0x130 07:26:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1234.574518][T24934] aead_recvmsg+0x271/0xd40 [ 1234.579091][T24934] ? aead_release+0x40/0x40 [ 1234.583766][T24934] sock_recvmsg+0x8e/0xb0 [ 1234.588339][T24934] ____sys_recvmsg+0x144/0x350 [ 1234.593254][T24934] ? copy_msghdr_from_user+0x24d/0x320 [ 1234.598999][T24934] ___sys_recvmsg+0xb2/0x100 [ 1234.605273][T24934] ? __fdget+0x29/0x30 [ 1234.609378][T24934] ? sockfd_lookup_light+0xa5/0x100 [ 1234.614922][T24934] __sys_recvmsg+0x98/0x140 [ 1234.619617][T24934] __x64_sys_recvmsg+0x4c/0x60 [ 1234.624678][T24934] do_syscall_64+0xc7/0x390 [ 1234.629349][T24934] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1234.635485][T24934] RIP: 0033:0x45c479 [ 1234.639404][T24934] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1234.659908][T24934] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1234.668527][T24934] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1234.677022][T24934] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1234.685207][T24934] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1234.693394][T24934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1234.701599][T24934] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000003 07:26:10 executing program 2 (fault-call:6 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:10 executing program 5 (fault-call:5 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000140)=""/4096) getpid() prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c907801000000000000000200000000000000ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1234.871339][T25146] FAULT_INJECTION: forcing a failure. [ 1234.871339][T25146] name failslab, interval 1, probability 0, space 0, times 0 07:26:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1234.918812][T25150] FAULT_INJECTION: forcing a failure. [ 1234.918812][T25150] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.940805][T25146] CPU: 0 PID: 25146 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1234.949885][T25146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.960492][T25146] Call Trace: [ 1234.964015][T25146] dump_stack+0x11d/0x187 07:26:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000035809f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1234.968530][T25146] should_fail.cold+0x5/0xf [ 1234.973224][T25146] __should_failslab+0x82/0xb0 [ 1234.978229][T25146] should_failslab+0x5/0xf [ 1234.982945][T25146] __kmalloc+0x54/0x640 [ 1234.987154][T25146] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1234.993513][T25146] ? sock_kmalloc+0xbc/0x110 [ 1234.998128][T25146] ? preempt_count_add+0x63/0x90 [ 1235.003430][T25146] ? __list_del_entry_valid+0x83/0x8e [ 1235.008966][T25146] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1235.015039][T25146] sock_kmalloc+0xbc/0x110 [ 1235.019596][T25146] af_alg_alloc_areq+0x3b/0x130 [ 1235.024631][T25146] aead_recvmsg+0x271/0xd40 [ 1235.029268][T25146] ? aead_release+0x40/0x40 [ 1235.034357][T25146] sock_recvmsg+0x8e/0xb0 [ 1235.038745][T25146] ____sys_recvmsg+0x144/0x350 [ 1235.043842][T25146] ? copy_msghdr_from_user+0x24d/0x320 [ 1235.049539][T25146] ___sys_recvmsg+0xb2/0x100 [ 1235.054333][T25146] ? __fdget+0x29/0x30 [ 1235.058586][T25146] ? sockfd_lookup_light+0xa5/0x100 [ 1235.064093][T25146] __sys_recvmsg+0x98/0x140 [ 1235.068717][T25146] __x64_sys_recvmsg+0x4c/0x60 [ 1235.073692][T25146] do_syscall_64+0xc7/0x390 [ 1235.078273][T25146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1235.084517][T25146] RIP: 0033:0x45c479 [ 1235.088956][T25146] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1235.109382][T25146] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1235.118111][T25146] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1235.126295][T25146] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1235.134678][T25146] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1235.143878][T25146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1235.152149][T25146] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000003 [ 1235.160785][T25150] CPU: 1 PID: 25150 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1235.169486][T25150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.179909][T25150] Call Trace: [ 1235.183397][T25150] dump_stack+0x11d/0x187 [ 1235.187772][T25150] should_fail.cold+0x5/0xf [ 1235.192772][T25150] __should_failslab+0x82/0xb0 [ 1235.197720][T25150] should_failslab+0x5/0xf [ 1235.202205][T25150] __kmalloc+0x54/0x640 [ 1235.206704][T25150] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1235.213059][T25150] ? sock_kmalloc+0xbc/0x110 [ 1235.218001][T25150] ? preempt_count_add+0x63/0x90 [ 1235.223024][T25150] ? __list_del_entry_valid+0x83/0x8e [ 1235.228550][T25150] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1235.234473][T25150] sock_kmalloc+0xbc/0x110 [ 1235.239074][T25150] af_alg_alloc_areq+0x3b/0x130 [ 1235.243989][T25150] aead_recvmsg+0x271/0xd40 [ 1235.248704][T25150] ? aead_release+0x40/0x40 [ 1235.253243][T25150] sock_recvmsg+0x8e/0xb0 [ 1235.257637][T25150] ____sys_recvmsg+0x144/0x350 [ 1235.262650][T25150] ? copy_msghdr_from_user+0x24d/0x320 [ 1235.268253][T25150] ___sys_recvmsg+0xb2/0x100 [ 1235.273012][T25150] ? __fdget+0x29/0x30 [ 1235.277246][T25150] ? sockfd_lookup_light+0xa5/0x100 [ 1235.282538][T25150] __sys_recvmsg+0x98/0x140 [ 1235.287446][T25150] __x64_sys_recvmsg+0x4c/0x60 [ 1235.292261][T25150] do_syscall_64+0xc7/0x390 [ 1235.297331][T25150] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1235.303271][T25150] RIP: 0033:0x45c479 [ 1235.307188][T25150] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1235.327777][T25150] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1235.336691][T25150] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1235.344987][T25150] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1235.353209][T25150] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1235.361640][T25150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 07:26:10 executing program 2 (fault-call:6 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1235.369778][T25150] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000004 07:26:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000fff00"}, 0x1c) [ 1235.506870][T25266] FAULT_INJECTION: forcing a failure. [ 1235.506870][T25266] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.534673][T25266] CPU: 1 PID: 25266 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1235.543630][T25266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.554227][T25266] Call Trace: [ 1235.557604][T25266] dump_stack+0x11d/0x187 [ 1235.562062][T25266] should_fail.cold+0x5/0xf [ 1235.567000][T25266] __should_failslab+0x82/0xb0 [ 1235.572018][T25266] should_failslab+0x5/0xf [ 1235.576644][T25266] __kmalloc+0x54/0x640 [ 1235.581056][T25266] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1235.587005][T25266] ? sock_kmalloc+0xbc/0x110 [ 1235.591717][T25266] ? preempt_count_add+0x63/0x90 [ 1235.596840][T25266] ? __list_del_entry_valid+0x83/0x8e [ 1235.602541][T25266] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1235.608641][T25266] sock_kmalloc+0xbc/0x110 [ 1235.613364][T25266] af_alg_alloc_areq+0x3b/0x130 [ 1235.618462][T25266] aead_recvmsg+0x271/0xd40 [ 1235.624022][T25266] ? aead_release+0x40/0x40 [ 1235.628552][T25266] sock_recvmsg+0x8e/0xb0 [ 1235.633055][T25266] ____sys_recvmsg+0x144/0x350 [ 1235.638053][T25266] ? copy_msghdr_from_user+0x24d/0x320 [ 1235.643800][T25266] ___sys_recvmsg+0xb2/0x100 [ 1235.648639][T25266] ? __fdget+0x29/0x30 07:26:11 executing program 5 (fault-call:5 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1235.652908][T25266] ? sockfd_lookup_light+0xa5/0x100 [ 1235.658204][T25266] __sys_recvmsg+0x98/0x140 [ 1235.662989][T25266] __x64_sys_recvmsg+0x4c/0x60 [ 1235.668015][T25266] do_syscall_64+0xc7/0x390 [ 1235.672556][T25266] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1235.678840][T25266] RIP: 0033:0x45c479 [ 1235.682918][T25266] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:26:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1235.703094][T25266] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1235.711696][T25266] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1235.719983][T25266] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1235.728517][T25266] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1235.736541][T25266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1235.744704][T25266] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000004 [ 1235.783718][T25372] FAULT_INJECTION: forcing a failure. [ 1235.783718][T25372] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.853141][T25372] CPU: 0 PID: 25372 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1235.862217][T25372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.872375][T25372] Call Trace: [ 1235.876035][T25372] dump_stack+0x11d/0x187 [ 1235.880403][T25372] should_fail.cold+0x5/0xf [ 1235.884949][T25372] __should_failslab+0x82/0xb0 [ 1235.889913][T25372] should_failslab+0x5/0xf [ 1235.894492][T25372] __kmalloc+0x54/0x640 [ 1235.898672][T25372] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1235.905007][T25372] ? sock_kmalloc+0xbc/0x110 [ 1235.909817][T25372] ? preempt_count_add+0x63/0x90 [ 1235.914970][T25372] ? __list_del_entry_valid+0x83/0x8e [ 1235.920720][T25372] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1235.927458][T25372] sock_kmalloc+0xbc/0x110 [ 1235.932359][T25372] af_alg_alloc_areq+0x3b/0x130 [ 1235.937466][T25372] aead_recvmsg+0x271/0xd40 [ 1235.942306][T25372] ? aead_release+0x40/0x40 [ 1235.947210][T25372] sock_recvmsg+0x8e/0xb0 [ 1235.951665][T25372] ____sys_recvmsg+0x144/0x350 [ 1235.960031][T25372] ? copy_msghdr_from_user+0x24d/0x320 [ 1235.965524][T25372] ___sys_recvmsg+0xb2/0x100 [ 1235.970485][T25372] ? __fdget+0x29/0x30 [ 1235.974909][T25372] ? sockfd_lookup_light+0xa5/0x100 [ 1235.980378][T25372] __sys_recvmsg+0x98/0x140 [ 1235.985493][T25372] __x64_sys_recvmsg+0x4c/0x60 [ 1235.991015][T25372] do_syscall_64+0xc7/0x390 [ 1235.995575][T25372] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1236.001953][T25372] RIP: 0033:0x45c479 [ 1236.005894][T25372] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.026018][T25372] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1236.034661][T25372] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1236.042679][T25372] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 07:26:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000140)={{0x2, 0x0, 0x80, {0x2, 0x1000, 0x3}}, "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", "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"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000002200)={0x4, 0x1000, 0x4, r5, 0x0, &(0x7f00000021c0)={0x9e0907, 0x6, [], @p_u16=&(0x7f00000000c0)}}) r6 = socket$netlink(0x10, 0x3, 0x8) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[], 0x0) [ 1236.050921][T25372] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1236.059096][T25372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1236.067175][T25372] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000005 07:26:11 executing program 2 (fault-call:6 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1236.175427][T25387] FAULT_INJECTION: forcing a failure. [ 1236.175427][T25387] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.190397][T25387] CPU: 0 PID: 25387 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1236.199649][T25387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.210296][T25387] Call Trace: [ 1236.213612][T25387] dump_stack+0x11d/0x187 [ 1236.218247][T25387] should_fail.cold+0x5/0xf [ 1236.222915][T25387] __should_failslab+0x82/0xb0 [ 1236.227744][T25387] should_failslab+0x5/0xf [ 1236.232194][T25387] __kmalloc+0x54/0x640 [ 1236.236554][T25387] ? sock_kmalloc+0xbc/0x110 [ 1236.241178][T25387] ? preempt_count_add+0x63/0x90 [ 1236.246160][T25387] ? __list_del_entry_valid+0x83/0x8e [ 1236.251909][T25387] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1236.258010][T25387] sock_kmalloc+0xbc/0x110 [ 1236.262459][T25387] af_alg_alloc_areq+0x3b/0x130 [ 1236.267460][T25387] aead_recvmsg+0x271/0xd40 [ 1236.272020][T25387] ? aead_release+0x40/0x40 [ 1236.276772][T25387] sock_recvmsg+0x8e/0xb0 [ 1236.281136][T25387] ____sys_recvmsg+0x144/0x350 [ 1236.286263][T25387] ? copy_msghdr_from_user+0x24d/0x320 [ 1236.291860][T25387] ___sys_recvmsg+0xb2/0x100 [ 1236.296567][T25387] ? __fdget+0x29/0x30 [ 1236.300709][T25387] ? sockfd_lookup_light+0xa5/0x100 [ 1236.305938][T25387] __sys_recvmsg+0x98/0x140 [ 1236.310619][T25387] __x64_sys_recvmsg+0x4c/0x60 [ 1236.315414][T25387] do_syscall_64+0xc7/0x390 [ 1236.320212][T25387] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1236.326126][T25387] RIP: 0033:0x45c479 [ 1236.330498][T25387] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.350713][T25387] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1236.359154][T25387] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1236.367319][T25387] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 07:26:11 executing program 5 (fault-call:5 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000ffffffff00"}, 0x1c) [ 1236.375493][T25387] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1236.383691][T25387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1236.391805][T25387] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000005 [ 1236.437101][T25494] FAULT_INJECTION: forcing a failure. [ 1236.437101][T25494] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.464439][T25494] CPU: 0 PID: 25494 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1236.473485][T25494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.483742][T25494] Call Trace: [ 1236.487314][T25494] dump_stack+0x11d/0x187 [ 1236.491900][T25494] should_fail.cold+0x5/0xf [ 1236.496998][T25494] __should_failslab+0x82/0xb0 [ 1236.502190][T25494] should_failslab+0x5/0xf [ 1236.506618][T25494] __kmalloc+0x54/0x640 [ 1236.510922][T25494] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1236.518065][T25494] ? sock_kmalloc+0xbc/0x110 [ 1236.522905][T25494] ? preempt_count_add+0x63/0x90 [ 1236.527857][T25494] ? __list_del_entry_valid+0x83/0x8e [ 1236.533658][T25494] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1236.539704][T25494] sock_kmalloc+0xbc/0x110 [ 1236.544261][T25494] af_alg_alloc_areq+0x3b/0x130 [ 1236.549126][T25494] aead_recvmsg+0x271/0xd40 [ 1236.553833][T25494] ? aead_release+0x40/0x40 [ 1236.558427][T25494] sock_recvmsg+0x8e/0xb0 [ 1236.562987][T25494] ____sys_recvmsg+0x144/0x350 [ 1236.567876][T25494] ? copy_msghdr_from_user+0x24d/0x320 [ 1236.573500][T25494] ___sys_recvmsg+0xb2/0x100 [ 1236.578274][T25494] ? __fdget+0x29/0x30 [ 1236.582363][T25494] ? sockfd_lookup_light+0xa5/0x100 [ 1236.587685][T25494] __sys_recvmsg+0x98/0x140 [ 1236.592221][T25494] __x64_sys_recvmsg+0x4c/0x60 [ 1236.597015][T25494] do_syscall_64+0xc7/0x390 [ 1236.601534][T25494] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1236.607590][T25494] RIP: 0033:0x45c479 [ 1236.611752][T25494] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:26:12 executing program 2 (fault-call:6 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1236.631908][T25494] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1236.640446][T25494] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1236.648584][T25494] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1236.656616][T25494] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1236.664918][T25494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1236.673177][T25494] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000006 [ 1236.790373][T25502] FAULT_INJECTION: forcing a failure. [ 1236.790373][T25502] name failslab, interval 1, probability 0, space 0, times 0 07:26:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000819f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000ffffffffffffffff00"}, 0x1c) 07:26:12 executing program 5 (fault-call:5 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1236.854240][T25502] CPU: 1 PID: 25502 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1236.863229][T25502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.873323][T25502] Call Trace: [ 1236.876779][T25502] dump_stack+0x11d/0x187 [ 1236.881160][T25502] should_fail.cold+0x5/0xf [ 1236.885777][T25502] __should_failslab+0x82/0xb0 [ 1236.890568][T25502] should_failslab+0x5/0xf [ 1236.895378][T25502] __kmalloc+0x54/0x640 [ 1236.899931][T25502] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1236.906080][T25502] ? sock_kmalloc+0xbc/0x110 [ 1236.910709][T25502] ? preempt_count_add+0x63/0x90 [ 1236.915827][T25502] ? __list_del_entry_valid+0x83/0x8e [ 1236.921942][T25502] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1236.929365][T25502] sock_kmalloc+0xbc/0x110 [ 1236.934624][T25502] af_alg_alloc_areq+0x3b/0x130 [ 1236.939514][T25502] aead_recvmsg+0x271/0xd40 [ 1236.944560][T25502] ? aead_release+0x40/0x40 [ 1236.949089][T25502] sock_recvmsg+0x8e/0xb0 [ 1236.953664][T25502] ____sys_recvmsg+0x144/0x350 [ 1236.958662][T25502] ? copy_msghdr_from_user+0x24d/0x320 [ 1236.964669][T25502] ___sys_recvmsg+0xb2/0x100 [ 1236.969471][T25502] ? __fdget+0x29/0x30 [ 1236.973669][T25502] ? sockfd_lookup_light+0xa5/0x100 [ 1236.978966][T25502] __sys_recvmsg+0x98/0x140 [ 1236.983673][T25502] __x64_sys_recvmsg+0x4c/0x60 [ 1236.988468][T25502] do_syscall_64+0xc7/0x390 [ 1236.993366][T25502] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1236.999445][T25502] RIP: 0033:0x45c479 [ 1237.003583][T25502] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1237.024463][T25502] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1237.034172][T25502] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1237.043230][T25502] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1237.051836][T25502] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1237.060338][T25502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1237.068598][T25502] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000006 [ 1237.087214][T25577] FAULT_INJECTION: forcing a failure. [ 1237.087214][T25577] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.128211][T25577] CPU: 0 PID: 25577 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1237.137182][T25577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.147250][T25577] Call Trace: [ 1237.150644][T25577] dump_stack+0x11d/0x187 [ 1237.155209][T25577] should_fail.cold+0x5/0xf [ 1237.159912][T25577] __should_failslab+0x82/0xb0 [ 1237.164700][T25577] should_failslab+0x5/0xf [ 1237.169409][T25577] __kmalloc+0x54/0x640 [ 1237.173722][T25577] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1237.179938][T25577] ? sock_kmalloc+0xbc/0x110 [ 1237.184822][T25577] ? preempt_count_add+0x63/0x90 [ 1237.190165][T25577] ? __list_del_entry_valid+0x83/0x8e [ 1237.195865][T25577] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1237.202078][T25577] sock_kmalloc+0xbc/0x110 [ 1237.206526][T25577] af_alg_alloc_areq+0x3b/0x130 [ 1237.211442][T25577] aead_recvmsg+0x271/0xd40 [ 1237.216128][T25577] ? aead_release+0x40/0x40 [ 1237.220897][T25577] sock_recvmsg+0x8e/0xb0 [ 1237.225260][T25577] ____sys_recvmsg+0x144/0x350 [ 1237.230191][T25577] ? copy_msghdr_from_user+0x24d/0x320 [ 1237.235991][T25577] ___sys_recvmsg+0xb2/0x100 [ 1237.240828][T25577] ? __fdget+0x29/0x30 [ 1237.244920][T25577] ? sockfd_lookup_light+0xa5/0x100 [ 1237.250435][T25577] __sys_recvmsg+0x98/0x140 [ 1237.255139][T25577] __x64_sys_recvmsg+0x4c/0x60 [ 1237.259937][T25577] do_syscall_64+0xc7/0x390 [ 1237.264531][T25577] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1237.270443][T25577] RIP: 0033:0x45c479 07:26:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1237.274388][T25577] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1237.294868][T25577] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1237.303737][T25577] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1237.312048][T25577] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1237.320287][T25577] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:26:12 executing program 2 (fault-call:6 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1237.328693][T25577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1237.336855][T25577] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000007 [ 1237.454855][T25627] FAULT_INJECTION: forcing a failure. [ 1237.454855][T25627] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.476013][T25627] CPU: 0 PID: 25627 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1237.484996][T25627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.495541][T25627] Call Trace: [ 1237.499075][T25627] dump_stack+0x11d/0x187 [ 1237.503517][T25627] should_fail.cold+0x5/0xf [ 1237.508193][T25627] __should_failslab+0x82/0xb0 [ 1237.513104][T25627] should_failslab+0x5/0xf [ 1237.517754][T25627] __kmalloc+0x54/0x640 [ 1237.522056][T25627] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1237.527974][T25627] ? sock_kmalloc+0xbc/0x110 [ 1237.532590][T25627] ? preempt_count_add+0x63/0x90 [ 1237.537850][T25627] ? __list_del_entry_valid+0x83/0x8e [ 1237.543397][T25627] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1237.549737][T25627] sock_kmalloc+0xbc/0x110 [ 1237.554191][T25627] af_alg_alloc_areq+0x3b/0x130 [ 1237.559308][T25627] aead_recvmsg+0x271/0xd40 [ 1237.564255][T25627] ? aead_release+0x40/0x40 [ 1237.568921][T25627] sock_recvmsg+0x8e/0xb0 [ 1237.573361][T25627] ____sys_recvmsg+0x144/0x350 [ 1237.578243][T25627] ? copy_msghdr_from_user+0x24d/0x320 [ 1237.584302][T25627] ___sys_recvmsg+0xb2/0x100 [ 1237.589049][T25627] ? __fdget+0x29/0x30 [ 1237.593199][T25627] ? sockfd_lookup_light+0xa5/0x100 [ 1237.598508][T25627] __sys_recvmsg+0x98/0x140 [ 1237.603409][T25627] __x64_sys_recvmsg+0x4c/0x60 [ 1237.608376][T25627] do_syscall_64+0xc7/0x390 [ 1237.613166][T25627] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1237.619198][T25627] RIP: 0033:0x45c479 [ 1237.623204][T25627] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1237.643724][T25627] RSP: 002b:00007f122fc30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 07:26:13 executing program 5 (fault-call:5 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:13 executing program 2 (fault-call:6 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1237.652132][T25627] RAX: ffffffffffffffda RBX: 00007f122fc316d4 RCX: 000000000045c479 [ 1237.660239][T25627] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1237.668518][T25627] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1237.676705][T25627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1237.684959][T25627] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000007 07:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000200"}, 0x1c) [ 1237.807372][T25734] FAULT_INJECTION: forcing a failure. [ 1237.807372][T25734] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.868225][T25734] CPU: 0 PID: 25734 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1237.877198][T25734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.887517][T25734] Call Trace: [ 1237.890933][T25734] dump_stack+0x11d/0x187 [ 1237.895505][T25734] should_fail.cold+0x5/0xf [ 1237.900344][T25734] __should_failslab+0x82/0xb0 [ 1237.905371][T25734] should_failslab+0x5/0xf [ 1237.909943][T25734] __kmalloc+0x54/0x640 07:26:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="ffffdd869f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1237.914353][T25734] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1237.920583][T25734] ? sock_kmalloc+0xbc/0x110 [ 1237.925403][T25734] ? preempt_count_add+0x63/0x90 [ 1237.930461][T25734] ? __list_del_entry_valid+0x83/0x8e [ 1237.935920][T25734] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1237.942194][T25734] sock_kmalloc+0xbc/0x110 [ 1237.946648][T25734] af_alg_alloc_areq+0x3b/0x130 [ 1237.951934][T25734] aead_recvmsg+0x271/0xd40 [ 1237.956636][T25734] ? aead_release+0x40/0x40 [ 1237.961385][T25734] sock_recvmsg+0x8e/0xb0 [ 1237.965959][T25734] ____sys_recvmsg+0x144/0x350 [ 1237.970852][T25734] ? copy_msghdr_from_user+0x24d/0x320 [ 1237.976615][T25734] ___sys_recvmsg+0xb2/0x100 [ 1237.981402][T25734] ? __fdget+0x29/0x30 [ 1237.985626][T25734] ? sockfd_lookup_light+0xa5/0x100 [ 1237.990931][T25734] __sys_recvmsg+0x98/0x140 [ 1237.995696][T25734] __x64_sys_recvmsg+0x4c/0x60 [ 1238.000724][T25734] do_syscall_64+0xc7/0x390 [ 1238.005264][T25734] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1238.011343][T25734] RIP: 0033:0x45c479 07:26:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{0x8, 0x0, r4}, {}]}, 0x34, 0x0) r5 = getegid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{0x8, 0x0, r5}, {}]}, 0x34, 0x0) r6 = getegid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{0x8, 0x0, r6}, {}]}, 0x34, 0x0) r7 = getegid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{0x8, 0x0, r7}, {}]}, 0x34, 0x0) r8 = getegid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{0x8, 0x0, r8}, {}]}, 0x34, 0x0) r9 = getegid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{0x8, 0x0, r9}, {}]}, 0x34, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x1, r2}, {0x2, 0x1, r3}], {0x4, 0x4}, [{0x8, 0x4, r4}, {0x8, 0x2, r5}, {0x8, 0x0, r6}, {0x8, 0x0, r7}, {0x8, 0x9, r8}, {0x8, 0x2, r9}], {0x10, 0x4}, {0x20, 0xebbbf80a7f20cbdd}}, 0x64, 0x2) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1238.015273][T25734] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1238.034999][T25734] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1238.043570][T25734] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1238.051559][T25734] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1238.059546][T25734] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000300"}, 0x1c) [ 1238.067538][T25734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1238.075767][T25734] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000008 07:26:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:13 executing program 5 (fault-call:5 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000400"}, 0x1c) [ 1238.563969][T25970] FAULT_INJECTION: forcing a failure. [ 1238.563969][T25970] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.604020][T25970] CPU: 1 PID: 25970 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1238.612741][T25970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.622801][T25970] Call Trace: [ 1238.626139][T25970] dump_stack+0x11d/0x187 [ 1238.630487][T25970] should_fail.cold+0x5/0xf [ 1238.635089][T25970] __should_failslab+0x82/0xb0 [ 1238.639872][T25970] should_failslab+0x5/0xf [ 1238.644301][T25970] __kmalloc+0x54/0x640 [ 1238.648468][T25970] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1238.654366][T25970] ? sock_kmalloc+0xbc/0x110 [ 1238.659000][T25970] ? preempt_count_add+0x63/0x90 [ 1238.664063][T25970] ? __list_del_entry_valid+0x83/0x8e [ 1238.669444][T25970] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1238.675406][T25970] sock_kmalloc+0xbc/0x110 [ 1238.679862][T25970] af_alg_alloc_areq+0x3b/0x130 [ 1238.684791][T25970] aead_recvmsg+0x271/0xd40 [ 1238.689378][T25970] ? aead_release+0x40/0x40 [ 1238.693910][T25970] sock_recvmsg+0x8e/0xb0 [ 1238.698230][T25970] ____sys_recvmsg+0x144/0x350 [ 1238.703060][T25970] ? copy_msghdr_from_user+0x24d/0x320 [ 1238.708556][T25970] ___sys_recvmsg+0xb2/0x100 [ 1238.713214][T25970] ? __fdget+0x29/0x30 [ 1238.717448][T25970] ? sockfd_lookup_light+0xa5/0x100 [ 1238.722690][T25970] __sys_recvmsg+0x98/0x140 [ 1238.727190][T25970] __x64_sys_recvmsg+0x4c/0x60 [ 1238.731957][T25970] do_syscall_64+0xc7/0x390 [ 1238.736507][T25970] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1238.742381][T25970] RIP: 0033:0x45c479 07:26:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580), 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet(r2, &(0x7f00000002c0)="bc99312a6d96c1ce6dc5ec695753671ddff81d0f17c5091df10f19114776c3629dc850ff7b776cdf520178634f8277ee36ee7427ff86ad50e1618a0ac72e157f4430a30aa869f6cf2b9e5fb4c657110d3d072ad3d2dbaa7f88105937ce20822da95a609a92a8f8d9d4407ed965a5b7bc81abe6ac22016993e7e506e8beb8a015ec07fc3c34508e990bf0a8c8c58f8b530dd8121e616b639b5c0fec26421547b0702549329ce2ff048f8de03d1388afc2ccb9c5d80cb8d0735c60e5963a74a494fc53fe54549b842a8702b699d487d0d8f4e3747007a9003289940e95b0d657e0d552a82c5d3f", 0xe6, 0x4000000, &(0x7f00000001c0)={0x2, 0x4e24, @remote}, 0x10) dup2(r2, r3) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000180)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) memfd_create(&(0x7f0000000140)='proc\\\x00', 0x2) write$apparmor_exec(r5, &(0x7f00000000c0)={'stack ', 'syzkaller1\x00'}, 0x11) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1238.746281][T25970] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1238.766134][T25970] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1238.774550][T25970] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1238.782505][T25970] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1238.790457][T25970] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1238.798412][T25970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1238.806455][T25970] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000009 07:26:14 executing program 5 (fault-call:5 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000047889f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000500"}, 0x1c) [ 1238.990902][T26082] FAULT_INJECTION: forcing a failure. [ 1238.990902][T26082] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.023725][ T27] audit: type=1400 audit(1583220374.368:76): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="syzkaller1" pid=26078 comm="syz-executor.0" [ 1239.049433][T26082] CPU: 0 PID: 26082 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1239.058160][T26082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.068250][T26082] Call Trace: [ 1239.071554][T26082] dump_stack+0x11d/0x187 [ 1239.075887][T26082] should_fail.cold+0x5/0xf [ 1239.080404][T26082] __should_failslab+0x82/0xb0 [ 1239.085687][T26082] should_failslab+0x5/0xf [ 1239.090102][T26082] __kmalloc+0x54/0x640 [ 1239.094259][T26082] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1239.100149][T26082] ? sock_kmalloc+0xbc/0x110 [ 1239.104845][T26082] ? preempt_count_add+0x63/0x90 [ 1239.109864][T26082] ? __list_del_entry_valid+0x83/0x8e [ 1239.115240][T26082] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1239.121132][T26082] sock_kmalloc+0xbc/0x110 [ 1239.125583][T26082] af_alg_alloc_areq+0x3b/0x130 [ 1239.130496][T26082] aead_recvmsg+0x271/0xd40 [ 1239.135104][T26082] ? aead_release+0x40/0x40 [ 1239.139614][T26082] sock_recvmsg+0x8e/0xb0 [ 1239.143969][T26082] ____sys_recvmsg+0x144/0x350 [ 1239.148794][T26082] ? copy_msghdr_from_user+0x24d/0x320 [ 1239.154283][T26082] ___sys_recvmsg+0xb2/0x100 [ 1239.158999][T26082] ? __fdget+0x29/0x30 [ 1239.163123][T26082] ? sockfd_lookup_light+0xa5/0x100 [ 1239.168357][T26082] __sys_recvmsg+0x98/0x140 [ 1239.172922][T26082] __x64_sys_recvmsg+0x4c/0x60 [ 1239.177689][T26082] do_syscall_64+0xc7/0x390 [ 1239.182206][T26082] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1239.188119][T26082] RIP: 0033:0x45c479 [ 1239.192045][T26082] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1239.211645][T26082] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1239.220225][T26082] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1239.228292][T26082] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1239.236258][T26082] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1239.244318][T26082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1239.252300][T26082] R13: 0000000000000898 R14: 00000000004cb09f R15: 000000000000000a 07:26:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030008, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000600"}, 0x1c) 07:26:14 executing program 5 (fault-call:5 fault-nth:11): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580), 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1239.604115][T26301] FAULT_INJECTION: forcing a failure. [ 1239.604115][T26301] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.617052][T26301] CPU: 1 PID: 26301 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1239.625737][T26301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.635790][T26301] Call Trace: [ 1239.639090][T26301] dump_stack+0x11d/0x187 [ 1239.643431][T26301] should_fail.cold+0x5/0xf [ 1239.648007][T26301] __should_failslab+0x82/0xb0 [ 1239.652892][T26301] should_failslab+0x5/0xf [ 1239.657391][T26301] __kmalloc+0x54/0x640 [ 1239.661556][T26301] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1239.667519][T26301] ? sock_kmalloc+0xbc/0x110 [ 1239.672144][T26301] ? preempt_count_add+0x63/0x90 [ 1239.677096][T26301] ? __list_del_entry_valid+0x83/0x8e [ 1239.682483][T26301] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1239.688385][T26301] sock_kmalloc+0xbc/0x110 [ 1239.692866][T26301] af_alg_alloc_areq+0x3b/0x130 [ 1239.697735][T26301] aead_recvmsg+0x271/0xd40 [ 1239.702309][T26301] ? aead_release+0x40/0x40 [ 1239.706824][T26301] sock_recvmsg+0x8e/0xb0 [ 1239.711165][T26301] ____sys_recvmsg+0x144/0x350 [ 1239.715938][T26301] ? copy_msghdr_from_user+0x24d/0x320 [ 1239.721413][T26301] ___sys_recvmsg+0xb2/0x100 [ 1239.726076][T26301] ? __fdget+0x29/0x30 [ 1239.731563][T26301] ? sockfd_lookup_light+0xa5/0x100 [ 1239.736819][T26301] __sys_recvmsg+0x98/0x140 [ 1239.741419][T26301] __x64_sys_recvmsg+0x4c/0x60 [ 1239.746222][T26301] do_syscall_64+0xc7/0x390 [ 1239.750744][T26301] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1239.756642][T26301] RIP: 0033:0x45c479 [ 1239.760632][T26301] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1239.780262][T26301] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1239.788678][T26301] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1239.796735][T26301] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1239.804713][T26301] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1239.812692][T26301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1239.820666][T26301] R13: 0000000000000898 R14: 00000000004cb09f R15: 000000000000000b 07:26:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 07:26:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x3, 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80000, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r9 = accept$alg(r8, 0x0, 0x0) sendmsg$alg(r9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r9, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r9, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r10 = dup2(r7, r9) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r11) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:15 executing program 5 (fault-call:5 fault-nth:12): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:15 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000048889f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580), 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1240.197357][T26420] FAULT_INJECTION: forcing a failure. [ 1240.197357][T26420] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.237385][T26420] CPU: 0 PID: 26420 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1240.246181][T26420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.256317][T26420] Call Trace: [ 1240.259632][T26420] dump_stack+0x11d/0x187 [ 1240.264069][T26420] should_fail.cold+0x5/0xf [ 1240.268595][T26420] __should_failslab+0x82/0xb0 [ 1240.273370][T26420] should_failslab+0x5/0xf [ 1240.277815][T26420] __kmalloc+0x54/0x640 [ 1240.282048][T26420] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1240.288996][T26420] ? sock_kmalloc+0xbc/0x110 [ 1240.293593][T26420] ? preempt_count_add+0x63/0x90 [ 1240.298543][T26420] ? __list_del_entry_valid+0x83/0x8e [ 1240.303931][T26420] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1240.309844][T26420] sock_kmalloc+0xbc/0x110 [ 1240.314327][T26420] af_alg_alloc_areq+0x3b/0x130 [ 1240.319180][T26420] aead_recvmsg+0x271/0xd40 [ 1240.323702][T26420] ? aead_release+0x40/0x40 [ 1240.328203][T26420] sock_recvmsg+0x8e/0xb0 [ 1240.332658][T26420] ____sys_recvmsg+0x144/0x350 [ 1240.337429][T26420] ? copy_msghdr_from_user+0x24d/0x320 [ 1240.342941][T26420] ___sys_recvmsg+0xb2/0x100 [ 1240.347541][T26420] ? __fdget+0x29/0x30 [ 1240.351611][T26420] ? sockfd_lookup_light+0xa5/0x100 [ 1240.356972][T26420] __sys_recvmsg+0x98/0x140 [ 1240.361508][T26420] __x64_sys_recvmsg+0x4c/0x60 [ 1240.366349][T26420] do_syscall_64+0xc7/0x390 [ 1240.370936][T26420] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1240.376833][T26420] RIP: 0033:0x45c479 [ 1240.380762][T26420] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1240.400437][T26420] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1240.408865][T26420] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1240.416841][T26420] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1240.424891][T26420] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1240.432861][T26420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1240.440822][T26420] R13: 0000000000000898 R14: 00000000004cb09f R15: 000000000000000c 07:26:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x7ffff000}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 07:26:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r6, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x1) getpid() setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 07:26:16 executing program 5 (fault-call:5 fault-nth:13): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000064889f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) [ 1241.133878][T26656] FAULT_INJECTION: forcing a failure. [ 1241.133878][T26656] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.263353][T26656] CPU: 1 PID: 26656 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1241.272071][T26656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.282242][T26656] Call Trace: [ 1241.285557][T26656] dump_stack+0x11d/0x187 [ 1241.289920][T26656] should_fail.cold+0x5/0xf [ 1241.294455][T26656] __should_failslab+0x82/0xb0 [ 1241.299333][T26656] should_failslab+0x5/0xf [ 1241.303778][T26656] __kmalloc+0x54/0x640 [ 1241.307987][T26656] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1241.313898][T26656] ? sock_kmalloc+0xbc/0x110 [ 1241.318529][T26656] ? preempt_count_add+0x63/0x90 [ 1241.323486][T26656] ? __list_del_entry_valid+0x83/0x8e [ 1241.328926][T26656] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1241.334839][T26656] sock_kmalloc+0xbc/0x110 [ 1241.339297][T26656] af_alg_alloc_areq+0x3b/0x130 [ 1241.344273][T26656] aead_recvmsg+0x271/0xd40 [ 1241.348873][T26656] ? aead_release+0x40/0x40 [ 1241.353438][T26656] sock_recvmsg+0x8e/0xb0 [ 1241.357794][T26656] ____sys_recvmsg+0x144/0x350 [ 1241.362596][T26656] ? copy_msghdr_from_user+0x24d/0x320 [ 1241.368176][T26656] ___sys_recvmsg+0xb2/0x100 [ 1241.372807][T26656] ? __fdget+0x29/0x30 [ 1241.376886][T26656] ? sockfd_lookup_light+0xa5/0x100 [ 1241.382228][T26656] __sys_recvmsg+0x98/0x140 [ 1241.386767][T26656] __x64_sys_recvmsg+0x4c/0x60 [ 1241.391565][T26656] do_syscall_64+0xc7/0x390 [ 1241.396103][T26656] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1241.402012][T26656] RIP: 0033:0x45c479 [ 1241.405943][T26656] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1241.425699][T26656] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1241.434130][T26656] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1241.442136][T26656] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1241.450169][T26656] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:26:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1241.458151][T26656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1241.466209][T26656] R13: 0000000000000898 R14: 00000000004cb09f R15: 000000000000000d 07:26:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x120001257}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:16 executing program 5 (fault-call:5 fault-nth:14): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1241.663542][T26875] FAULT_INJECTION: forcing a failure. [ 1241.663542][T26875] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.679000][T26875] CPU: 0 PID: 26875 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1241.687688][T26875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.697751][T26875] Call Trace: [ 1241.701132][T26875] dump_stack+0x11d/0x187 [ 1241.705527][T26875] should_fail.cold+0x5/0xf [ 1241.710111][T26875] __should_failslab+0x82/0xb0 [ 1241.714919][T26875] should_failslab+0x5/0xf [ 1241.719354][T26875] __kmalloc+0x54/0x640 [ 1241.723530][T26875] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1241.729445][T26875] ? sock_kmalloc+0xbc/0x110 [ 1241.734103][T26875] ? preempt_count_add+0x63/0x90 [ 1241.739064][T26875] ? __list_del_entry_valid+0x83/0x8e [ 1241.744459][T26875] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1241.750430][T26875] sock_kmalloc+0xbc/0x110 [ 1241.754926][T26875] af_alg_alloc_areq+0x3b/0x130 [ 1241.759799][T26875] aead_recvmsg+0x271/0xd40 [ 1241.764308][T26875] ? aead_release+0x40/0x40 [ 1241.768814][T26875] sock_recvmsg+0x8e/0xb0 [ 1241.773140][T26875] ____sys_recvmsg+0x144/0x350 [ 1241.777917][T26875] ? copy_msghdr_from_user+0x24d/0x320 [ 1241.783429][T26875] ___sys_recvmsg+0xb2/0x100 [ 1241.788033][T26875] ? __fdget+0x29/0x30 [ 1241.792167][T26875] ? sockfd_lookup_light+0xa5/0x100 [ 1241.797424][T26875] __sys_recvmsg+0x98/0x140 [ 1241.801929][T26875] __x64_sys_recvmsg+0x4c/0x60 [ 1241.806796][T26875] do_syscall_64+0xc7/0x390 [ 1241.811287][T26875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1241.817177][T26875] RIP: 0033:0x45c479 [ 1241.821112][T26875] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1241.840820][T26875] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1241.849239][T26875] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 07:26:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r4, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r4, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r4, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1241.857203][T26875] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1241.865165][T26875] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1241.873133][T26875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1241.881102][T26875] R13: 0000000000000898 R14: 00000000004cb09f R15: 000000000000000e 07:26:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) write$tun(r5, &(0x7f00000013c0)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT=r7, @ANYRES16=0x0, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR64], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRESHEX], @ANYRESHEX, @ANYBLOB="54989be1c09ae0afdef671487f7f509718b49d4e41c1a5303df97e61beef72766dd38fa89eca107ec4d34179e6c15c7abbdf819d91548ef66a4c8869238247f0949a9e9a1015a4c9e5292e1e4bf47ca1da2cdc8908176adaec2a1105b7a4fca823db497d68fb8cbb14c6650fbece55a982cf2b49f37574b5725f3b25ca1c7a55b38be528818da8edc3e25d3eb865a31b8b1fd798f0218a7680ee5340e1d5117f1a4cc1c4921a107d5981b03a2aacc2f7545f4749b8fc4fa0545d18b472232b5be03d763d3148d151349e6b", @ANYBLOB="3d1f3cfbd11aac34d49409756d1ceebda348ce1c8692"]], 0x1) 07:26:17 executing program 5 (fault-call:5 fault-nth:15): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000e00"}, 0x1c) 07:26:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="ffffa8889f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1242.222542][T26892] FAULT_INJECTION: forcing a failure. [ 1242.222542][T26892] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.247065][T26892] CPU: 1 PID: 26892 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1242.255837][T26892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.265904][T26892] Call Trace: [ 1242.269228][T26892] dump_stack+0x11d/0x187 [ 1242.273580][T26892] should_fail.cold+0x5/0xf [ 1242.278146][T26892] __should_failslab+0x82/0xb0 [ 1242.282951][T26892] should_failslab+0x5/0xf [ 1242.287390][T26892] __kmalloc+0x54/0x640 [ 1242.291564][T26892] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1242.297473][T26892] ? sock_kmalloc+0xbc/0x110 [ 1242.302356][T26892] ? preempt_count_add+0x63/0x90 [ 1242.307325][T26892] ? __list_del_entry_valid+0x83/0x8e [ 1242.312720][T26892] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1242.318643][T26892] sock_kmalloc+0xbc/0x110 [ 1242.323077][T26892] af_alg_alloc_areq+0x3b/0x130 [ 1242.328108][T26892] aead_recvmsg+0x271/0xd40 [ 1242.332655][T26892] ? aead_release+0x40/0x40 [ 1242.337214][T26892] sock_recvmsg+0x8e/0xb0 [ 1242.341562][T26892] ____sys_recvmsg+0x144/0x350 [ 1242.346359][T26892] ? copy_msghdr_from_user+0x24d/0x320 [ 1242.351853][T26892] ___sys_recvmsg+0xb2/0x100 [ 1242.356477][T26892] ? __fdget+0x29/0x30 [ 1242.360579][T26892] ? sockfd_lookup_light+0xa5/0x100 [ 1242.365800][T26892] __sys_recvmsg+0x98/0x140 [ 1242.370355][T26892] __x64_sys_recvmsg+0x4c/0x60 [ 1242.375147][T26892] do_syscall_64+0xc7/0x390 [ 1242.379675][T26892] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1242.385616][T26892] RIP: 0033:0x45c479 [ 1242.389567][T26892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1242.409187][T26892] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 07:26:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r4, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r4, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r4, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1242.417620][T26892] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1242.425600][T26892] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1242.433585][T26892] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1242.441566][T26892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1242.449553][T26892] R13: 0000000000000898 R14: 00000000004cb09f R15: 000000000000000f 07:26:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x2, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000f00"}, 0x1c) 07:26:18 executing program 5 (fault-call:5 fault-nth:16): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r4, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r4, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r4, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1242.810671][T27120] FAULT_INJECTION: forcing a failure. [ 1242.810671][T27120] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.841414][T27120] CPU: 0 PID: 27120 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1242.850728][T27120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.860793][T27120] Call Trace: [ 1242.864110][T27120] dump_stack+0x11d/0x187 [ 1242.869293][T27120] should_fail.cold+0x5/0xf [ 1242.873877][T27120] __should_failslab+0x82/0xb0 [ 1242.878673][T27120] should_failslab+0x5/0xf [ 1242.883086][T27120] __kmalloc+0x54/0x640 [ 1242.887241][T27120] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1242.893293][T27120] ? sock_kmalloc+0xbc/0x110 [ 1242.897977][T27120] ? preempt_count_add+0x63/0x90 [ 1242.902934][T27120] ? __list_del_entry_valid+0x83/0x8e [ 1242.908403][T27120] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1242.914423][T27120] sock_kmalloc+0xbc/0x110 [ 1242.918913][T27120] af_alg_alloc_areq+0x3b/0x130 [ 1242.923895][T27120] aead_recvmsg+0x271/0xd40 [ 1242.928433][T27120] ? aead_release+0x40/0x40 [ 1242.933078][T27120] sock_recvmsg+0x8e/0xb0 [ 1242.937455][T27120] ____sys_recvmsg+0x144/0x350 [ 1242.942248][T27120] ? copy_msghdr_from_user+0x24d/0x320 [ 1242.947770][T27120] ___sys_recvmsg+0xb2/0x100 [ 1242.952414][T27120] ? __fdget+0x29/0x30 [ 1242.956724][T27120] ? sockfd_lookup_light+0xa5/0x100 [ 1242.961951][T27120] __sys_recvmsg+0x98/0x140 [ 1242.966548][T27120] __x64_sys_recvmsg+0x4c/0x60 [ 1242.971337][T27120] do_syscall_64+0xc7/0x390 [ 1242.975970][T27120] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1242.981874][T27120] RIP: 0033:0x45c479 [ 1242.985908][T27120] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1243.005700][T27120] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1243.014134][T27120] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1243.022197][T27120] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1243.030189][T27120] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1243.038174][T27120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1243.046234][T27120] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000010 07:26:18 executing program 5 (fault-call:5 fault-nth:17): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$CAPI_INSTALLED(r2, 0x80024322) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000440)={'syzkaller1\x00', {0x7, 0x0, @local}}) getpid() ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x305) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x5}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000140)="c2b49fbe9077ecaf49ffca83ccb38d752493426f1cc98cf4d029e7c269326ff2e9ad6a8d5cf6187a6a3dcb3f933415953f5584f941cd45329a4ff4cab1e44bbb358c1fabc2366d70a61ec524c2706b2099f37bb0d689cdd71b5c4bf0c3b605e6f32f056171705763d0cc2b24f821acb672114066613d9cc66a6f5768e83253ddfda7f6d34344033ba4883543ad1c2fe9e8c87162382aea78c2eaf570caadc100ab56669a21b3f8837abeb5c6f082aab539138dc8c08ffded37ec1c94caa784fab61911a51faca8179580f40fdd46c97cfc92429b7b7d9ddd3e965c1b6c", 0xdd}, {&(0x7f00000000c0)="b77b4a533987fa", 0x7}, {&(0x7f0000000240)="c46aaa0c7e4a2e56c6661d4eca9ba64d448309e1edeade3901967640a0b2174262214297a214309e122b00af884940d659e394f03b207dee9d0345fd33638afde78ee9d03682d733df66f1fdaf68506aaeadfa8abc98be5f1849421be7dda12ff8c1cfe094e065f4a230823401c20841ff86bfa32049160a3bfb302620e68cb9aa8db268e642e07190c351e4e6c4375f74c9ef089f7189b38b2628bdb858a6eb", 0xa0}, {&(0x7f0000000300)="7728be2a861019568b3497d54323465951e5151316e7bd56b5cbc4a59e73fe883588ae2bbd5b1e3e1d5c1b5fc33c1ec27c3ebe7b9e224b9715387fbc6336100a3e5cf759f23edcc29a025ba37aa8769c85348d5f59d0fa001f9928fd152e4d3df6b204f60bbc2b294b0615e3cf655684ba8ad8ccde91f013df451efaed97fc8059814148f7ed73b9a19b81f08e80936a14e9d7b39c3bcd423ecec44411f1061769844596eb0b8bc0e945027f1090ccc0997205000f3a9e9cdd4ea09ed8", 0xbd}], 0x4}, 0x8002) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1dfab8015f1b9ea4c000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1243.204185][T27176] FAULT_INJECTION: forcing a failure. [ 1243.204185][T27176] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.230813][T27176] CPU: 1 PID: 27176 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1243.239536][T27176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.249600][T27176] Call Trace: [ 1243.252919][T27176] dump_stack+0x11d/0x187 [ 1243.257308][T27176] should_fail.cold+0x5/0xf [ 1243.261914][T27176] __should_failslab+0x82/0xb0 [ 1243.266698][T27176] should_failslab+0x5/0xf [ 1243.271137][T27176] __kmalloc+0x54/0x640 [ 1243.275315][T27176] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1243.281222][T27176] ? sock_kmalloc+0xbc/0x110 [ 1243.285842][T27176] ? preempt_count_add+0x63/0x90 [ 1243.291009][T27176] ? __list_del_entry_valid+0x83/0x8e [ 1243.296396][T27176] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1243.302434][T27176] sock_kmalloc+0xbc/0x110 [ 1243.306882][T27176] af_alg_alloc_areq+0x3b/0x130 [ 1243.311740][T27176] aead_recvmsg+0x271/0xd40 [ 1243.316281][T27176] ? aead_release+0x40/0x40 [ 1243.320805][T27176] sock_recvmsg+0x8e/0xb0 [ 1243.325265][T27176] ____sys_recvmsg+0x144/0x350 [ 1243.330061][T27176] ? copy_msghdr_from_user+0x24d/0x320 [ 1243.335553][T27176] ___sys_recvmsg+0xb2/0x100 [ 1243.340212][T27176] ? __fdget+0x29/0x30 [ 1243.344314][T27176] ? sockfd_lookup_light+0xa5/0x100 [ 1243.350024][T27176] __sys_recvmsg+0x98/0x140 07:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000001000"}, 0x1c) 07:26:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1243.354568][T27176] __x64_sys_recvmsg+0x4c/0x60 [ 1243.359490][T27176] do_syscall_64+0xc7/0x390 [ 1243.364031][T27176] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1243.370054][T27176] RIP: 0033:0x45c479 [ 1243.373996][T27176] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1243.393749][T27176] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1243.402173][T27176] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1243.410201][T27176] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1243.418311][T27176] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1243.426301][T27176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1243.434358][T27176] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000011 07:26:18 executing program 5 (fault-call:5 fault-nth:18): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x3, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="ffffca889f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000001100"}, 0x1c) [ 1243.679182][T27355] FAULT_INJECTION: forcing a failure. [ 1243.679182][T27355] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.696776][T27355] CPU: 1 PID: 27355 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1243.705493][T27355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.715562][T27355] Call Trace: [ 1243.718874][T27355] dump_stack+0x11d/0x187 [ 1243.723255][T27355] should_fail.cold+0x5/0xf [ 1243.727901][T27355] __should_failslab+0x82/0xb0 [ 1243.732690][T27355] should_failslab+0x5/0xf [ 1243.737129][T27355] __kmalloc+0x54/0x640 [ 1243.741342][T27355] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1243.747306][T27355] ? sock_kmalloc+0xbc/0x110 [ 1243.751913][T27355] ? preempt_count_add+0x63/0x90 [ 1243.756972][T27355] ? __list_del_entry_valid+0x83/0x8e [ 1243.762358][T27355] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1243.768275][T27355] sock_kmalloc+0xbc/0x110 [ 1243.772710][T27355] af_alg_alloc_areq+0x3b/0x130 [ 1243.777581][T27355] aead_recvmsg+0x271/0xd40 [ 1243.782118][T27355] ? aead_release+0x40/0x40 [ 1243.786635][T27355] sock_recvmsg+0x8e/0xb0 [ 1243.790979][T27355] ____sys_recvmsg+0x144/0x350 [ 1243.795765][T27355] ? copy_msghdr_from_user+0x24d/0x320 [ 1243.801261][T27355] ___sys_recvmsg+0xb2/0x100 [ 1243.805932][T27355] ? __fdget+0x29/0x30 [ 1243.810056][T27355] ? sockfd_lookup_light+0xa5/0x100 [ 1243.815278][T27355] __sys_recvmsg+0x98/0x140 [ 1243.819818][T27355] __x64_sys_recvmsg+0x4c/0x60 [ 1243.824613][T27355] do_syscall_64+0xc7/0x390 07:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000001700"}, 0x1c) [ 1243.829137][T27355] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1243.835042][T27355] RIP: 0033:0x45c479 [ 1243.839038][T27355] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1243.858652][T27355] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1243.867089][T27355] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1243.875069][T27355] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1243.883137][T27355] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1243.891121][T27355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1243.899190][T27355] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000012 07:26:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:19 executing program 5 (fault-call:5 fault-nth:19): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4042, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r2, 0xc01c64ad, &(0x7f00000000c0)={0x0, 0x3dd8, 0x400, 0x6, 0x5, 0xe8, 0x8}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r3, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x23450df) 07:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) [ 1244.205508][T27495] FAULT_INJECTION: forcing a failure. [ 1244.205508][T27495] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.281972][T27495] CPU: 0 PID: 27495 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1244.290839][T27495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.301236][T27495] Call Trace: [ 1244.304640][T27495] dump_stack+0x11d/0x187 [ 1244.308994][T27495] should_fail.cold+0x5/0xf [ 1244.313571][T27495] __should_failslab+0x82/0xb0 [ 1244.318350][T27495] should_failslab+0x5/0xf [ 1244.322780][T27495] __kmalloc+0x54/0x640 [ 1244.326949][T27495] ? sock_kmalloc+0xbc/0x110 [ 1244.331568][T27495] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1244.337827][T27495] sock_kmalloc+0xbc/0x110 [ 1244.342334][T27495] af_alg_alloc_areq+0x3b/0x130 [ 1244.347331][T27495] aead_recvmsg+0x271/0xd40 [ 1244.351862][T27495] ? aead_release+0x40/0x40 [ 1244.356374][T27495] sock_recvmsg+0x8e/0xb0 [ 1244.360706][T27495] ____sys_recvmsg+0x144/0x350 [ 1244.365475][T27495] ? copy_msghdr_from_user+0x24d/0x320 [ 1244.371012][T27495] ___sys_recvmsg+0xb2/0x100 [ 1244.375610][T27495] ? __fdget+0x29/0x30 [ 1244.379702][T27495] ? sockfd_lookup_light+0xa5/0x100 [ 1244.384991][T27495] __sys_recvmsg+0x98/0x140 [ 1244.389529][T27495] __x64_sys_recvmsg+0x4c/0x60 [ 1244.394323][T27495] do_syscall_64+0xc7/0x390 [ 1244.398848][T27495] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1244.404756][T27495] RIP: 0033:0x45c479 [ 1244.408743][T27495] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1244.428445][T27495] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1244.436871][T27495] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1244.444867][T27495] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1244.452952][T27495] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1244.461008][T27495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1244.469056][T27495] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000013 07:26:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e0000000000007bdcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000fc00"}, 0x1c) 07:26:19 executing program 5 (fault-call:5 fault-nth:20): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x4, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000006899f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1244.717473][T27732] FAULT_INJECTION: forcing a failure. [ 1244.717473][T27732] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.774259][T27732] CPU: 0 PID: 27732 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1244.782979][T27732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.793056][T27732] Call Trace: [ 1244.796362][T27732] dump_stack+0x11d/0x187 [ 1244.800714][T27732] should_fail.cold+0x5/0xf [ 1244.805226][T27732] __should_failslab+0x82/0xb0 [ 1244.809981][T27732] should_failslab+0x5/0xf [ 1244.814412][T27732] __kmalloc+0x54/0x640 [ 1244.818580][T27732] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1244.824477][T27732] ? sock_kmalloc+0xbc/0x110 [ 1244.829128][T27732] ? preempt_count_add+0x63/0x90 [ 1244.834132][T27732] ? __list_del_entry_valid+0x83/0x8e [ 1244.839505][T27732] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1244.845410][T27732] sock_kmalloc+0xbc/0x110 [ 1244.849842][T27732] af_alg_alloc_areq+0x3b/0x130 [ 1244.854715][T27732] aead_recvmsg+0x271/0xd40 [ 1244.859301][T27732] ? aead_release+0x40/0x40 [ 1244.863810][T27732] sock_recvmsg+0x8e/0xb0 [ 1244.868140][T27732] ____sys_recvmsg+0x144/0x350 [ 1244.872912][T27732] ? copy_msghdr_from_user+0x24d/0x320 [ 1244.878450][T27732] ___sys_recvmsg+0xb2/0x100 [ 1244.883073][T27732] ? __fdget+0x29/0x30 [ 1244.887146][T27732] ? sockfd_lookup_light+0xa5/0x100 [ 1244.892407][T27732] __sys_recvmsg+0x98/0x140 [ 1244.896936][T27732] __x64_sys_recvmsg+0x4c/0x60 [ 1244.901860][T27732] do_syscall_64+0xc7/0x390 [ 1244.906406][T27732] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1244.912313][T27732] RIP: 0033:0x45c479 [ 1244.916213][T27732] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1244.935841][T27732] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1244.944259][T27732] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1244.952223][T27732] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1244.960288][T27732] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1244.968254][T27732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1244.976218][T27732] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000014 07:26:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000f40100"}, 0x1c) 07:26:20 executing program 5 (fault-call:5 fault-nth:21): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1245.250779][T27960] FAULT_INJECTION: forcing a failure. [ 1245.250779][T27960] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.267800][T27960] CPU: 1 PID: 27960 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1245.276497][T27960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.286562][T27960] Call Trace: [ 1245.289935][T27960] dump_stack+0x11d/0x187 [ 1245.294353][T27960] should_fail.cold+0x5/0xf [ 1245.298908][T27960] __should_failslab+0x82/0xb0 [ 1245.303674][T27960] should_failslab+0x5/0xf [ 1245.308079][T27960] __kmalloc+0x54/0x640 [ 1245.312245][T27960] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1245.318202][T27960] ? sock_kmalloc+0xbc/0x110 [ 1245.322816][T27960] ? preempt_count_add+0x63/0x90 [ 1245.327742][T27960] ? __list_del_entry_valid+0x83/0x8e [ 1245.333446][T27960] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1245.339334][T27960] sock_kmalloc+0xbc/0x110 [ 1245.343745][T27960] af_alg_alloc_areq+0x3b/0x130 [ 1245.348599][T27960] aead_recvmsg+0x271/0xd40 [ 1245.353172][T27960] ? aead_release+0x40/0x40 [ 1245.357673][T27960] sock_recvmsg+0x8e/0xb0 [ 1245.362092][T27960] ____sys_recvmsg+0x144/0x350 [ 1245.366905][T27960] ? copy_msghdr_from_user+0x24d/0x320 [ 1245.372364][T27960] ___sys_recvmsg+0xb2/0x100 [ 1245.377025][T27960] ? __fdget+0x29/0x30 [ 1245.381124][T27960] ? sockfd_lookup_light+0xa5/0x100 [ 1245.386315][T27960] __sys_recvmsg+0x98/0x140 [ 1245.390860][T27960] __x64_sys_recvmsg+0x4c/0x60 [ 1245.395620][T27960] do_syscall_64+0xc7/0x390 [ 1245.400111][T27960] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1245.406006][T27960] RIP: 0033:0x45c479 [ 1245.409950][T27960] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1245.429601][T27960] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1245.438010][T27960] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 07:26:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:20 executing program 5 (fault-call:5 fault-nth:22): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1245.445975][T27960] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1245.453958][T27960] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1245.461929][T27960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1245.470426][T27960] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000015 07:26:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xd6) 07:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000180200"}, 0x1c) 07:26:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="88a8ffff9f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000400200"}, 0x1c) 07:26:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x5, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 1245.913091][T27964] FAULT_INJECTION: forcing a failure. [ 1245.913091][T27964] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.982848][T27964] CPU: 0 PID: 27964 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1245.991612][T27964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.001746][T27964] Call Trace: [ 1246.005280][T27964] dump_stack+0x11d/0x187 [ 1246.009740][T27964] should_fail.cold+0x5/0xf [ 1246.014387][T27964] __should_failslab+0x82/0xb0 [ 1246.019177][T27964] should_failslab+0x5/0xf [ 1246.023613][T27964] __kmalloc+0x54/0x640 [ 1246.027871][T27964] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1246.033774][T27964] ? sock_kmalloc+0xbc/0x110 [ 1246.038499][T27964] ? preempt_count_add+0x63/0x90 [ 1246.043489][T27964] ? __list_del_entry_valid+0x83/0x8e [ 1246.048883][T27964] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1246.054913][T27964] sock_kmalloc+0xbc/0x110 [ 1246.059374][T27964] af_alg_alloc_areq+0x3b/0x130 [ 1246.064323][T27964] aead_recvmsg+0x271/0xd40 [ 1246.068862][T27964] ? aead_release+0x40/0x40 [ 1246.073406][T27964] sock_recvmsg+0x8e/0xb0 [ 1246.077762][T27964] ____sys_recvmsg+0x144/0x350 [ 1246.082628][T27964] ? copy_msghdr_from_user+0x24d/0x320 [ 1246.088127][T27964] ___sys_recvmsg+0xb2/0x100 [ 1246.092733][T27964] ? __fdget+0x29/0x30 [ 1246.096845][T27964] ? sockfd_lookup_light+0xa5/0x100 [ 1246.102093][T27964] __sys_recvmsg+0x98/0x140 [ 1246.106638][T27964] __x64_sys_recvmsg+0x4c/0x60 [ 1246.111535][T27964] do_syscall_64+0xc7/0x390 [ 1246.116053][T27964] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1246.121952][T27964] RIP: 0033:0x45c479 07:26:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1246.125917][T27964] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1246.145526][T27964] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1246.153989][T27964] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1246.161981][T27964] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1246.169965][T27964] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1246.178179][T27964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1246.186163][T27964] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000016 07:26:21 executing program 5 (fault-call:5 fault-nth:23): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = dup2(r5, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r7) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000040)={0x3ff, 0x10000, {r2}, {0xee01}, 0x9, 0x81}) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f00000000c0)=r8) 07:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000300"}, 0x1c) 07:26:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) [ 1246.534810][T28312] FAULT_INJECTION: forcing a failure. [ 1246.534810][T28312] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.599512][T28312] CPU: 1 PID: 28312 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1246.608361][T28312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.618425][T28312] Call Trace: [ 1246.621779][T28312] dump_stack+0x11d/0x187 [ 1246.626178][T28312] should_fail.cold+0x5/0xf [ 1246.630813][T28312] __should_failslab+0x82/0xb0 [ 1246.635656][T28312] should_failslab+0x5/0xf [ 1246.640107][T28312] __kmalloc+0x54/0x640 [ 1246.644274][T28312] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1246.650167][T28312] ? sock_kmalloc+0xbc/0x110 [ 1246.654760][T28312] ? preempt_count_add+0x63/0x90 [ 1246.659789][T28312] ? __list_del_entry_valid+0x83/0x8e [ 1246.665158][T28312] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1246.671051][T28312] sock_kmalloc+0xbc/0x110 [ 1246.675468][T28312] af_alg_alloc_areq+0x3b/0x130 [ 1246.680324][T28312] aead_recvmsg+0x271/0xd40 [ 1246.684907][T28312] ? aead_release+0x40/0x40 [ 1246.689483][T28312] sock_recvmsg+0x8e/0xb0 [ 1246.693838][T28312] ____sys_recvmsg+0x144/0x350 [ 1246.698616][T28312] ? copy_msghdr_from_user+0x24d/0x320 [ 1246.704173][T28312] ___sys_recvmsg+0xb2/0x100 [ 1246.708918][T28312] ? __fdget+0x29/0x30 [ 1246.712995][T28312] ? sockfd_lookup_light+0xa5/0x100 [ 1246.718256][T28312] __sys_recvmsg+0x98/0x140 [ 1246.722800][T28312] __x64_sys_recvmsg+0x4c/0x60 [ 1246.727568][T28312] do_syscall_64+0xc7/0x390 [ 1246.732076][T28312] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1246.737960][T28312] RIP: 0033:0x45c479 [ 1246.741871][T28312] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1246.761682][T28312] RSP: 002b:00007f15a3bafc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1246.770092][T28312] RAX: ffffffffffffffda RBX: 00007f15a3bb06d4 RCX: 000000000045c479 [ 1246.778072][T28312] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1246.786036][T28312] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1246.794010][T28312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1246.801973][T28312] R13: 0000000000000898 R14: 00000000004cb09f R15: 0000000000000017 07:26:22 executing program 5 (fault-call:5 fault-nth:24): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000e80300"}, 0x1c) 07:26:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="88caffff9f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0x1) 07:26:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x6, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000500"}, 0x1c) 07:26:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030004, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(r2, &(0x7f0000004740)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)="89", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000003ec0)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x3, 0x18000000) close(r2) accept4(r3, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000600"}, 0x1c) 07:26:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030008, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="86ddffff9f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) [ 1247.886273][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:26:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x7, 0x0, 0x200e703, 0xe7030007}, 0x0) 07:26:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 07:26:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe70303e7, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r2}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x3, 0x2, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x44800) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x7ffff000}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 07:26:24 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000200009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000800000f062d717dd58000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcedd0825e9ecf3caa0be0f40abe8f3f7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dc0900000000000000543bdc1718ac01a4e165a21de0e02662e3d1027f986be16766aa09aa83ce4b78a613f0246f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x120001257}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 07:26:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000140)={0xc, @capture={0x1000, 0x1, {0x1ff, 0x800}, 0x7, 0x3042326b}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r4, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="89230347502487600c755e8da91556c1371806ea7b62681c60c6b1067f817d14945360", 0x23) r5 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000240)="e8966764e7afb8559242d11a5a7f4e388cdd4e7b2c966fa28e8afaf19d509773a2514c9d949cd848d7a49d253b48ad5f0d30922d6b463f7b87e036df4e9200cd925d7d6e8663af960dc3d30113fcd484f7709ed940d18b5a6b64df9b45c0733475be6631901079b0bbf21e6ab6ec", 0x6e}, {&(0x7f00000002c0)="dade91934464f12f5d22a4795cc148264766a91e750e12e2c5793c4ceeac6a10b5cd151c893daa0d658216bce26addaafc391f5905295b313b5a15bf95acf085cd4423bcb105be0c02c098", 0x4b}, {&(0x7f0000000340)="ec7cc0cffa8f72313a3ca45efe977ad5667baab042305aa65f33f74359021e7a34313431923dafc115ca87ca8d33c67f56cb0703bb5ea5cc4197015313f396a524182f1178249e91a7de1661f66f19cc41c2d82fea23fad871f6c51bdbf13d6415d669f574e0309df4c0c273ea9db6a656220ffe5f6f594522a07ac5bdbbba62d3318ee957c957b09b75092790ccba31ee507908ee87eedd20670f4b868fb83f9bc58a83a226fdfe465038a0088663f34c2dcd747721241e503b2e5130e3292f6fa8de51759bb63908e2731114aef46a9a4f7a57b144364467b30edaf725a7f5", 0xe0}], 0x3) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e708, 0xe7030007}, 0x0) 07:26:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x1, 0x100}}, 0x120) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x2, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000e00"}, 0x1c) 07:26:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x68000000}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f00000001c0)=[{0x6, 0x0, 0x8, 0xecca}, {0x3ff, 0x1, 0x81, 0x8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r2, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r3, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r3, 0x6, 0x3, 0xb5}, 0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r3, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x2fe, 0x8}, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={r3, 0xfffffffc}, 0x8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r4, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x1, 0x100}}, 0x120) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x3, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000800009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:25 executing program 0: r0 = msgget$private(0x0, 0x1) msgrcv(r0, &(0x7f0000000140)={0x0, ""/234}, 0xf2, 0x2, 0x1800) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x8) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r1, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000f00"}, 0x1c) 07:26:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x4, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x1, 0x100}}, 0x120) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030008}, 0x0) 07:26:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000001100"}, 0x1c) 07:26:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x5, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000003c0)={0xffffffffffffff83}, 0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x10012, r3, 0x0) creat(&(0x7f0000000380)='./file0\x00', 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000001700"}, 0x1c) 07:26:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x0, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="004305009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x6, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000021800"}, 0x1c) 07:26:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x7, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x0, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 07:26:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f00) 07:26:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x20}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r6, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYRES32=r6], 0x1) 07:26:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x0, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e704, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:26 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000806009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000e02e00"}, 0x1c) 07:26:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e708, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030008}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 07:26:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="008906009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x4000) 07:26:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000480)=""/118, 0x76}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r4, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x3, 0x20400) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) socket$alg(0x26, 0x5, 0x0) 07:26:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 07:26:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f00) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x85000) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000000c0)={&(0x7f0000000140)="d8c5a31a0ae219dfa3010114b9228b62721b5d31591936218427e4c3a8bcd8d75d6146e0394d3aa3bdf14d1101b7ca8ba66f751a79038e269d741f47dcea5006206f55ffdba6f89fdae0570e8385f4af6f1286abd38c4e6320bc4b9111506a051c97d17fe2af0c775e3b74bbc282004a23cad172a3398ef96441c2e9b99bec9522060a2eaac315882669163d6f7f376703c6176fcf9766bb0fea433908ff70c1d5a75cf89903a6164fd23c874c671a426115052da498a23f1ee41712caf40777a75db858a964932a50c798adc423304c57622ef1dfadf9d46b10198c4f87283971f2153548f0c0507f509043aa3b7280360594886d67cb", &(0x7f0000000240)=""/248, &(0x7f0000000340)="87edaf8b89a0be9dc79cb0e055845180b61d94927d88ebc9bed5a29f15df79d2eeac9c70b9f9e11c6fc6ed3ee04ec674ab94477f029e2abe01de4cc894018117c2675be1014ffe10bb000bbbfa6fdab431a171126a24ff68e808e21224eff3d94f3b32d82c254d99426861d131a4015960ababbc0aa86c4e03890936da915ba2010b0ba44a4e4f69808c125da125c62d1d092d5a0aa25467e2bc7c943c88174bd44d0e8c845aaeaffee7ac923c7a27bd254f18a889240996371df6c888", &(0x7f0000000400)="4d76354d8c918a011ceebbc96df0f6ed8a67f708f9860c8223d22acc940bc256543ec1b750429c3314375246a65e661f3b1f629326ebcdbbe471c8f5f4e4ca1190cd616e5c76a6954594ee556d99cc8f4228391d870d2a1fbb932ec9a686096f1b5ced7f2ac8b92445c2baf00b2a0d72fbf507612cd83fd405789a2d7c4319d3b614fbf1071a2316408bdc53ff29ed4e88d9eef79f36057b3dbf633be26169551d297a36b6842ee281c7abe31338a81565b1ad4e355e7f67d063ed89b5f44dbe31", 0x4, r2}, 0x38) 07:26:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000024000"}, 0x1c) 07:26:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x4000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:28 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000608009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0xff01) 07:26:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x1000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 07:26:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x2000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000af097dfb6082975deb4a0c9d3f84bd2013302e3afd610869decd8b77272a6caf790907b9a3ae7b323c43be65c29899ff1fff35c48f1553fc8b56a992d92089fe122830d098abf993e3d17a428dbc4187cec011349acf473c8ae0676690fcf509f01f85d161fbc19a317c31322cd22f767389"], 0xd6) 07:26:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000c07d00"}, 0x1c) 07:26:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="00800e009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x1000000) 07:26:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x40000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x7ffffffff000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8, 0x20000) r3 = dup2(r0, r1) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f00000000c0)={0x3, r3}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000dc7f00"}, 0x1c) 07:26:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x1000000000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000fe8000"}, 0x1c) 07:26:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="008035009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0xf0ffffff7f0000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f000000) 07:26:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0xa, &(0x7f0000000740)=[{&(0x7f0000000140)="6578975ed3cc17eea0b9bf34e12072b1bbf7bfa24decb72467c1c38d0b96c101216647167aee2ebea1cdd77c68f85379b70bab2daae498", 0x37, 0x6}, {&(0x7f0000000180)="7bc96eb3ca18748254026223f6579d3351ee3794c1af7265034294bb4cde235bd8725ce94661c970a35f32390de026ec22d2e77758e6570a42ade556c498e5c070ce3de34e6f68b650a273f5225183c79b067a94a0", 0x55, 0x800}, {&(0x7f0000000200)="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", 0xfb, 0x9a}, {&(0x7f0000000300)="a32a9e1d62f09524722b7f29985cd34dbc5bf610b76d7124b041514329c4b722581f8835b2596a6a8a008d5679001742613fbb3dc21a4c80efd9766df5460eb18cd4f24eb2fa865a7096497c67385babe7edc5a37ee98be5acebb491d748b2a906b9ac69157f0163f87b6900bbfe51521e1930916c5c51d3a38792d3e23ee36d0c2bcd3d4f2f75433c199b8af4436432b0de0267e0e3aedc3d1f0a66669a3cf2c2d9b060b681d55fb3a9deff469656584ef04ead5a25af144b7e86eb6090c394e2576cbc9cab", 0xc6, 0x5}, {&(0x7f0000000400)="1f6c18c3e48f66dc4918946fea36ff8cb68a2fec08a8c2b4f657755ec0659653f1d1dc368a170c1f3ab52164a66f46ac271cbbd41470bd971762c09d1f467b5754ef225a64da1083663329dfbf0aa38571ce2f3603bcbf805bcda45dbd21772f4c979e99b006df40f40750c14e997316e9cf5526afae24f412bcbf75112bf934", 0x80}, {&(0x7f0000000480)="613f0fc68f8c9166cbf7d4a471c96a35b39a30ee69639d521e8cf0582835b2632604d7c5ad8f8fa77f635f710e2617bbc7994f9ff367eaffc20acda5372a0e2f18b10c28bb3e3e46295ea38337422951227e530fb16890c21c1a970580a71ece6658de1f4c8231b07d683dfdffc61d737b7bf5ca26baa02e15fe0519816818e94cfc", 0x82, 0x8}, {&(0x7f0000000540)="fd809dfe835d56fa8bbc2d085bbb3606177fed7e2c8f94421bbe43936fb1b5b5613f3b9b5c595bf78fafde906992c3d1dc90dcc8bee4046fdacea006227ff335b420141073546c04b11459d1d4b4ff2c92f78fc17ec9845953ebb68d8b18bfcf54777689", 0x64, 0x100000000}, {&(0x7f00000005c0)="a545c663", 0x4, 0x8}, {&(0x7f0000000600)="518ce5af53352dfa2057f0b4e44a9f72f66382f20fb62ac29f4491ff67d922a325bfe12fbaa6c717d5af4877b16b65bd916f62c53be509a797a6c1b1ca64dad5131a3f796ad5df46d1bc5a7a2978c12a9f0b7cbe04baa57e850a8b70fde6a73bae64fffb66f9670acec49ebe2d11334e68bcd69bb583ecaecebb5c16305789cfcc4e99", 0x83, 0xcfe}, {&(0x7f00000006c0)="a66819c2402d72c439ba60c82f307b00ea3d39a868f94c12c121d1420a42c72e8c4515177a72ec726ef84b0cb98e2ce909b480a7a3fb5c1655f25395707334357b80af10bc3e9d7f890013a2cce3", 0x4e, 0xc666f47}], 0x1000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000840)='minix\x00', &(0x7f0000000880)='./file0\x00', 0x1, 0x6, &(0x7f0000000b40)=[{&(0x7f00000008c0)="e17513e257294a526ce21fe0", 0xc, 0xeb}, {&(0x7f0000000900)="f5cf8d81e9", 0x5, 0x5}, {&(0x7f0000000940)="a51f4341fd", 0x5, 0x1}, {&(0x7f00000014c0)="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", 0x1000, 0xa451}, {&(0x7f0000000980)="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", 0xfe, 0x6}, {&(0x7f0000000a80)="5523cf6a989a928214332499563c5233c39c3de374d01d352e79c9c451fa68ef83805827ba57a5dcf2308cd1c1966cc6a4b22a54151237ff3924717940639f8a3d755fe8e45bc6aa1786bef5258fabd8e7343501384c6a34863fa10c2a99490836af0b1f83fb403919cc2490ef70012f12d451df504190fd3de712b3f4f5564183d224e99636ed696605ffeb618041b319b5b1e65762dc24f89a41cc612a6df4ea6a4312916ca5d70c177d3cc6712770c2319f2498ccf664b19929c91b256e", 0xbf, 0xb358}], 0x884809, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r6, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f0000000c80)={0x4, 0x10001, 0xef, r7, 0x0, &(0x7f0000000c40)={0x990a61, 0x8, [], @p_u16=&(0x7f0000000c00)=0x18}}) setsockopt$inet_tcp_int(r8, 0x6, 0x9, &(0x7f0000000cc0)=0x3ff, 0x4) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000ffb800"}, 0x1c) 07:26:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x100000000000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000007dc000"}, 0x1c) 07:26:31 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0xe7c, 0xa, 0x4, 0x400, 0x3, {0x77359400}, {0x1, 0x2, 0x80, 0xe1, 0x80, 0xce, "2dd60903"}, 0x800, 0x2, @userptr=0x10000, 0x1, 0x0, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r4 = dup2(r2, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) r6 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r7) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0xf7, 0x3, 0x72f2, 0x68f, 0x4, 0x1ff, 0x5a, {r5, @in={{0x2, 0x4e20, @remote}}, 0x8, 0x80, 0x7fffffff, 0x6, 0x4}}, &(0x7f0000000280)=0xb0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r9 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r9, 0x202002) keyctl$revoke(0x3, r9) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r8, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xd6) 07:26:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000543009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x200000000000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000fec000"}, 0x1c) 07:26:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f00000000000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000007fdc00"}, 0x1c) 07:26:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x40000000) 07:26:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x4000000000000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYRES16=r2], 0x1) 07:26:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000002ee000"}, 0x1c) 07:26:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0xffffffff00000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="008847009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000003e800"}, 0x1c) 07:26:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40000}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000040)={'gretap0\x00', @random="6606f32db204"}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r6, 0x0, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f00000001c0)="7007f95aae41ee676fd205f31eca353675459ba9ae4920f27787746ea8ea08cdeb05dc45305367a495f62f6b8c13f6f37c01a1b9d992a3ae00df1ce705fba9d705220b4d5910e0e05ae2c86eb4abe2f1fd10f91763df780ffbf40e7449ae4b7bd25eb10b010c96659f6de8e357e23b1c6e632eb37a19", 0x76) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r7 = accept$alg(r5, 0x0, 0x0) sendmsg$alg(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f00000000c0)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) dup(r7) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000001f400"}, 0x1c) 07:26:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000002c0)={0xffffffff, 0x1, 0x4, 0x42814000, 0x0, {0x0, 0x2710}, {0x2, 0xc, 0x1, 0x3, 0x0, 0x9, "b4fe5fd8"}, 0xfffffffd, 0x2, @offset=0x8, 0x6, 0x0, r0}) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000240)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc30094db482e580a}, 0xc, &(0x7f0000000340)={&(0x7f0000002480)={0x1a34, r2, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b='\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c='\xa0\xcb\x87\x9aG\xf5\xbcdL\x0ei?\xa6\xd01\xc7J\x15S\xb6\xe9\x01\xb9\xff/Q\x8cx\x04/\xb5B'}, @WGDEVICE_A_PEERS={0x588, 0x8, 0x0, 0x1, [{0x128, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "20c9ecd1c589470352ebc19a1394cca818afafe9c0e0adfac511417db2df7eb1"}, @WGPEER_A_ALLOWEDIPS={0xcc, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x34}}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}]}]}]}, {0x45c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_ALLOWEDIPS={0xfc, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr="61e58f778cf3c9907c0a8e04037b7cab"}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x7}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000fc00"}, 0x1c) 07:26:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x7000000001) 07:26:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="008848009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00@\x00'}, 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r6, 0xba, 0x0) pidfd_open(r6, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r8 = accept$alg(r7, 0x0, 0x0) sendmsg$alg(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r8, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r8, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000000500)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r9, 0x0, 0x0) close(r9) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, 0x0, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_destroy(r10) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r12 = accept$alg(r11, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x4004894}, 0x0) write$binfmt_script(r12, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r12, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/154, 0x9a}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) io_cancel(r10, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x7fff, r12, &(0x7f0000000140)="f0ed6cbe7b6b6367441cf4060b799cbf89e054683338fd54cb9d9f6014c19c23a2bde9f725a245a92a6f8bb3ee06016caaf0f5f125981685d0efeef2683dc301ad625f25c7014557c72fae304dfa48bb800916152b2e581cee92601c96efcc7c7c300d817f188831f801f95f4eab333e2733f5ab5293b0e583dfdd89e88bb8c1a7ca4713ceabd4a0b0a2bd3b53f6318cd7d431ec0233c906af50fcc7", 0x9c, 0xf5ae, 0x0, 0x0, r4}, &(0x7f0000000240)) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r13, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r13, &(0x7f0000000080), 0x1c) r14 = dup2(r13, r13) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r14, r15) write$tun(r14, &(0x7f00000002c0)=ANY=[], 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) 07:26:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000080fe00"}, 0x1c) 07:26:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) gettid() memfd_create(0x0, 0x0) 07:26:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000c0fe00"}, 0x1c) 07:26:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002500)='/dev/cachefiles\x00', 0x80002, 0x0) ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000002640)={0x4, 0x4, &(0x7f0000002540)="39d82a0bdfea6889e977de08f9f24c37ce114daee9642276e3aac8a3250a6a103a5f88cd61267e5f962062df7b952752a81b7e9b529da345301ba65cff7c4be5b9659ae10f0f008ec923e953e005ec88c898b8889556015b485c8115f9e02e5e6df13de56c887e56ea6f136857e67e0f0e1a9cb3d88243694d88640d494dd4fe13a976ae354ae215bc2f28f08f0cc062a6200efc7f661f3b8c92c75cd94e463ed770b2a9b8614120571064e0a5211dce6fa7a337a29da6894395d45e373c2873e1c3069cedbd46864afb6f9d", {0x8000, 0xb0, 0x29363c55, 0x2, 0x2, 0x1, 0x8, 0x8}}) recvmsg$kcm(r5, &(0x7f0000001340)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/222, 0xde}], 0x2}, 0x40000120) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000013c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r7, &(0x7f00000024c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002480)={&(0x7f0000001400)={0x68, r8, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x191b72aa}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x40) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) gettid() memfd_create(0x0, 0x0) 07:26:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) 07:26:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f00000000c0)) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000ff00"}, 0x1c) 07:26:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x7ffffffff000) 07:26:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="008864009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) keyctl$session_to_parent(0x12) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$KDDELIO(r3, 0x4b35, 0x1f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000fff00"}, 0x1c) 07:26:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) gettid() memfd_create(0x0, 0x0) 07:26:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x1000000000000) 07:26:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={r2, @loopback, @remote}, 0xc) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000040)=r2) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b00a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0x1) 07:26:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4083, 0xff3}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/225) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x68000000}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@mcast2, 0x3, 0x2, 0xff, 0x4, 0x4, 0x7}, 0x20) 07:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000b8ff00"}, 0x1c) 07:26:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000200"}, 0x1c) 07:26:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xd6) 07:26:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "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"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) gettid() memfd_create(0x0, 0x0) 07:26:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000e80009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000a0d50200"}, 0x1c) 07:26:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r4, 0x0, 0x0) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x81000) r6 = dup2(r5, r3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r6, r7) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r8, 0x404c534a, &(0x7f00000003c0)={0x3, 0x80000001, 0x3}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r10 = accept$alg(r9, 0x0, 0x0) sendmsg$alg(r10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r10, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r10, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0xf000000, 0x7, 0x1, r10, 0x0, &(0x7f0000000100)={0xa00966, 0x6, [], @p_u8=&(0x7f00000000c0)=0x23}}) read$usbmon(r11, &(0x7f0000000240)=""/60, 0x3c) r12 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r12, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r14 = accept$alg(r13, 0x0, 0x0) sendmsg$alg(r14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r14, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r14, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r14, 0x8933, &(0x7f0000000280)={'batadv0\x00'}) recvmsg(r12, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "363f1f", "44de1291e1507e8c91a913d012464a3a3822ccf59557bb2a232ff01aafe571960e629ab0c39d393d861b97fe3a9306d2ce202b1204b0f57371b15cd3bbf64f4033e614ab3b029bc51048f54593d2120d6402a48f41bde7653223474b6722442be294de12fd929d18c4051e950499e9e431003ac5792947b2727050b9e79ce874fc576e4a1e557af161a01e05b6e497343bf307bd2fc806e85b3fa8ed35c152c7c89da16343e88f146eb31351699861662e166a58100eebf127141c04f19fc3f44fb1aa9fbd48ff3de3bff313a5519dc48f66d8d9544ac2f9812ed1c94ab0f3fc12a4115ee7aa6b608819e100fede4152e7e5e0075eb5acd4c20707e3151208c0"}}, 0x110) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280), 0x1, 0x0, 0x0, 0x40}, 0x80) setpriority(0x0, r0, 0x10ffff) r2 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfb) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000600)='\x00@\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000580)=0x100000001, 0x3ff) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/35, 0x23, 0x1, 0x100}}, 0x11c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) gettid() memfd_create(0x0, 0x0) 07:26:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0xf0ffffff7f0000) 07:26:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r4 = accept$alg(r3, 0x0, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x2) sendmsg$alg(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r5, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f0000000400), &(0x7f0000000440)=0x30) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000017c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x38, r7, 0x501, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r7, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) recvmmsg(r4, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000002400)=""/4110, 0x100e}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000140)="8fae8d019286dcaac359d1afa28337da859010960385c562e92467369bb31343ba41345f4e15f59927a5eaba872d324900ad52ae029a8b3ac5623d5b00d08a8b2e5be02d176e2eef3f113991971f858188077c067bba6a8c651253283cef6766f071d1c7731568769e67f729021d804e526468f17807b04a4d09a1a63c3c18c8550d93ef67b00f172a3a44fac970f2953ec9988ebe1ed91bfa48", 0x9a, r4}, 0x68) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r8 = dup2(r2, r2) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r9) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r8, 0x40405514, &(0x7f0000000040)={0x6, 0x3, 0x0, 0x4, 'syz0\x00', 0x7fff}) 07:26:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="003580009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000500"}, 0x1c) 07:26:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x100000000000000) 07:26:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x440400, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000240)="88eb510976b2361834126f77715334fb6d54f4452c84b643caaaf0feb0af4bdb6cb88daeefecd76ac1722f0aa8c6f792fafc73e55cbbc136ecdab8b31fa1de2480dbdc9787ab6c21211516") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r5) getsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0x4) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f00000002c0)) 07:26:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000598f0d00"}, 0x1c) 07:26:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) getsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r4, 0x0, 0x0) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x81000) r6 = dup2(r5, r3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r6, r7) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r8, 0x404c534a, &(0x7f00000003c0)={0x3, 0x80000001, 0x3}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r10 = accept$alg(r9, 0x0, 0x0) sendmsg$alg(r10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r10, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r10, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0xf000000, 0x7, 0x1, r10, 0x0, &(0x7f0000000100)={0xa00966, 0x6, [], @p_u8=&(0x7f00000000c0)=0x23}}) read$usbmon(r11, &(0x7f0000000240)=""/60, 0x3c) r12 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r12, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r14 = accept$alg(r13, 0x0, 0x0) sendmsg$alg(r14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r14, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r14, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r14, 0x8933, &(0x7f0000000280)={'batadv0\x00'}) recvmsg(r12, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r2 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e20, @broadcast}}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r3, 0xba, 0x0) r4 = dup(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7, 0x3f, 0x1, 0xf6, 0x0, 0x7, 0x52c, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0xe0fe9705f1dc260e}, 0x184, 0x4, 0xff, 0x5, 0x5, 0x4, 0x5}, r3, 0xf, r4, 0x8) write$snddsp(r4, &(0x7f00000001c0)="15acbbc167bb0df2f8e8ab046718773c7f42c345f9962e47fb2a540f689ce03f504f3fb5ffaaaa7173fdd3cf", 0x2c) ptrace$setopts(0x4200, r3, 0x7f, 0x9) 07:26:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000281400"}, 0x1c) 07:26:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r4, 0x0, 0x0) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x81000) r6 = dup2(r5, r3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r6, r7) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r8, 0x404c534a, &(0x7f00000003c0)={0x3, 0x80000001, 0x3}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r10 = accept$alg(r9, 0x0, 0x0) sendmsg$alg(r10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r10, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r10, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0xf000000, 0x7, 0x1, r10, 0x0, &(0x7f0000000100)={0xa00966, 0x6, [], @p_u8=&(0x7f00000000c0)=0x23}}) read$usbmon(r11, &(0x7f0000000240)=""/60, 0x3c) r12 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r12, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r14 = accept$alg(r13, 0x0, 0x0) sendmsg$alg(r14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r14, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r14, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r14, 0x8933, &(0x7f0000000280)={'batadv0\x00'}) recvmsg(r12, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000142800"}, 0x1c) 07:26:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000081009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'osx.', 'syzkaller1\x00'}) 07:26:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x100000070000000) 07:26:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000100"}, 0x1c) 07:26:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r4, 0x0, 0x0) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x81000) r6 = dup2(r5, r3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r6, r7) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r8, 0x404c534a, &(0x7f00000003c0)={0x3, 0x80000001, 0x3}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r10 = accept$alg(r9, 0x0, 0x0) sendmsg$alg(r10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r10, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r10, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0xf000000, 0x7, 0x1, r10, 0x0, &(0x7f0000000100)={0xa00966, 0x6, [], @p_u8=&(0x7f00000000c0)=0x23}}) read$usbmon(r11, &(0x7f0000000240)=""/60, 0x3c) r12 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r12, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r14 = accept$alg(r13, 0x0, 0x0) sendmsg$alg(r14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r14, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r14, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r14, 0x8933, &(0x7f0000000280)={'batadv0\x00'}) recvmsg(r12, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) r6 = socket$tipc(0x1e, 0x2, 0x0) r7 = fcntl$dupfd(r3, 0x0, r6) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) sendmsg$NFNL_MSG_CTHELPER_DEL(r5, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="7cd39652bd539e0002b3b1d41400158cd116fe00000100000700000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000002c0)=0x8) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r8, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r7, 0xc0205647, &(0x7f0000001340)={0x9c0000, 0x10001, 0x80000000, r8, 0x0, &(0x7f0000000200)={0x9e0001, 0x6, [], @p_u32=&(0x7f0000000100)=0x6}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001480)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) fstat(r11, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r12, 0x0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r13, 0x0, 0x0) fstat(r13, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r15, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r16 = accept$alg(r15, 0x0, 0x0) sendmsg$alg(r16, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r16, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r16, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ptmx\x00', 0x540c0, 0x0) r18 = socket$alg(0x26, 0x5, 0x0) bind$alg(r18, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r18, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r19 = accept$alg(r18, 0x0, 0x0) sendmsg$alg(r19, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r19, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r19, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r20 = socket$alg(0x26, 0x5, 0x0) bind$alg(r20, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r20, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r21 = accept$alg(r20, 0x0, 0x0) sendmsg$alg(r21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r21, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r21, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r22 = openat$capi20(0xffffffffffffff9c, &(0x7f0000001580)='/dev/capi20\x00', 0x2, 0x0) r23 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r23, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r23, &(0x7f0000000080), 0x1c) r24 = dup2(r23, r23) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r24, r25) r26 = ioctl$NS_GET_PARENT(r24, 0xb702, 0x0) r27 = socket$alg(0x26, 0x5, 0x0) bind$alg(r27, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r27, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r27, 0x0, 0x0) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r28, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r28, &(0x7f0000000080), 0x1c) r29 = dup2(r28, r28) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) r31 = dup2(r29, r30) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r31, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$TIOCGPGRP(r31, 0x540f, &(0x7f00000015c0)=0x0) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) r34 = getegid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{0x8, 0x0, r34}, {}]}, 0x34, 0x0) sendmmsg$unix(r9, &(0x7f0000001740)=[{&(0x7f0000001380)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001400)="7dc6537d", 0x4}], 0x1, &(0x7f00000016c0)=[@cred={{0x1c, 0x1, 0x2, {r10, r12, r14}}}, @rights={{0x38, 0x1, 0x1, [r16, r17, r19, r21, r22, r4, r5, r26, 0xffffffffffffffff, r27]}}, @cred={{0x1c, 0x1, 0x2, {r32, r33, r34}}}], 0x78, 0x2404c801}], 0x1, 0x80c1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x30, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) setsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000040)=0x8, 0x4) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000200"}, 0x1c) 07:26:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="004788009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) getsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00@\x00'}, 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r6, 0xba, 0x0) pidfd_open(r6, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r8 = accept$alg(r7, 0x0, 0x0) sendmsg$alg(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r8, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r8, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000000500)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r9, 0x0, 0x0) close(r9) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, 0x0, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_destroy(r10) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r12 = accept$alg(r11, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x4004894}, 0x0) write$binfmt_script(r12, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r12, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/154, 0x9a}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) io_cancel(r10, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x7fff, r12, &(0x7f0000000140)="f0ed6cbe7b6b6367441cf4060b799cbf89e054683338fd54cb9d9f6014c19c23a2bde9f725a245a92a6f8bb3ee06016caaf0f5f125981685d0efeef2683dc301ad625f25c7014557c72fae304dfa48bb800916152b2e581cee92601c96efcc7c7c300d817f188831f801f95f4eab333e2733f5ab5293b0e583dfdd89e88bb8c1a7ca4713ceabd4a0b0a2bd3b53f6318cd7d431ec0233c906af50fcc7", 0x9c, 0xf5ae, 0x0, 0x0, r4}, &(0x7f0000000240)) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r13, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r13, &(0x7f0000000080), 0x1c) r14 = dup2(r13, r13) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r14, r15) write$tun(r14, &(0x7f00000002c0)=ANY=[], 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) 07:26:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x420401, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x68000000}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x2d}, 0x200, 0x1, 0xfc, 0x2, 0x6, 0x3}, &(0x7f0000000340)=0x20) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000280)={&(0x7f0000002540)=ANY=[@ANYBLOB="300000be705e97496f00ffc4c11b5500", @ANYRES16=r4, @ANYBLOB="00082abd7000ffdbdf25090000001c0002800800030003000000080005000800000006000b0002000000"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x8001) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = dup2(r5, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r6, r7) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) recvmsg$kcm(r8, &(0x7f0000002500)={&(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1, &(0x7f0000002480)=""/113, 0x71}, 0x40010000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000300"}, 0x1c) 07:26:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f00000000000000) 07:26:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) chmod(&(0x7f00000000c0)='.\x00', 0x100) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000240)='user\x00', &(0x7f0000000280)='pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000000)) r1 = socket$netlink(0x10, 0x3, 0x0) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r2, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r4, r5) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x100, 0x0) write$tun(r6, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x1) 07:26:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000400"}, 0x1c) 07:26:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00@\x00'}, 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000040)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r6, 0xba, 0x0) pidfd_open(r6, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r8 = accept$alg(r7, 0x0, 0x0) sendmsg$alg(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r8, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r8, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000000500)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r9, 0x0, 0x0) close(r9) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, 0x0, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_destroy(r10) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r12 = accept$alg(r11, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x4004894}, 0x0) write$binfmt_script(r12, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r12, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/154, 0x9a}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) io_cancel(r10, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x7fff, r12, &(0x7f0000000140)="f0ed6cbe7b6b6367441cf4060b799cbf89e054683338fd54cb9d9f6014c19c23a2bde9f725a245a92a6f8bb3ee06016caaf0f5f125981685d0efeef2683dc301ad625f25c7014557c72fae304dfa48bb800916152b2e581cee92601c96efcc7c7c300d817f188831f801f95f4eab333e2733f5ab5293b0e583dfdd89e88bb8c1a7ca4713ceabd4a0b0a2bd3b53f6318cd7d431ec0233c906af50fcc7", 0x9c, 0xf5ae, 0x0, 0x0, r4}, &(0x7f0000000240)) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r13, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r13, &(0x7f0000000080), 0x1c) r14 = dup2(r13, r13) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r14, r15) write$tun(r14, &(0x7f00000002c0)=ANY=[], 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) 07:26:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="004888009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000500"}, 0x1c) 07:26:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xd6) 07:26:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000600"}, 0x1c) 07:26:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002500)='/dev/cachefiles\x00', 0x80002, 0x0) ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000002640)={0x4, 0x4, &(0x7f0000002540)="39d82a0bdfea6889e977de08f9f24c37ce114daee9642276e3aac8a3250a6a103a5f88cd61267e5f962062df7b952752a81b7e9b529da345301ba65cff7c4be5b9659ae10f0f008ec923e953e005ec88c898b8889556015b485c8115f9e02e5e6df13de56c887e56ea6f136857e67e0f0e1a9cb3d88243694d88640d494dd4fe13a976ae354ae215bc2f28f08f0cc062a6200efc7f661f3b8c92c75cd94e463ed770b2a9b8614120571064e0a5211dce6fa7a337a29da6894395d45e373c2873e1c3069cedbd46864afb6f9d", {0x8000, 0xb0, 0x29363c55, 0x2, 0x2, 0x1, 0x8, 0x8}}) recvmsg$kcm(r5, &(0x7f0000001340)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/222, 0xde}], 0x2}, 0x40000120) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000013c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r7, &(0x7f00000024c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002480)={&(0x7f0000001400)={0x68, r8, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x191b72aa}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x40) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="006488009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x4000000000000000) 07:26:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r2, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)={{0x10b, 0x2, 0x20, 0xf8, 0x212, 0x10001, 0xd5, 0x5}, "5e60743ddba99dc87f9b55a06f2f6135d6ac9745ca9c244b3af62a651d235b34aba457192cb2d6fa1fe0e77c811d854c2e61a42019fda72d08021456feec644df75e736289efb763379c6b87e4f8d1e23ccbd18479fa3663ec3dd7dc2ebfed73566fc2fe09b215c4216883bc9d92bb905dd6ba45f81b1fcf7732ff1eb04e0960aea3a4ffc62c62bda6bbde3d53bc85", [[], [], [], [], [], [], [], []]}, 0x8af) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002500)='/dev/cachefiles\x00', 0x80002, 0x0) ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000002640)={0x4, 0x4, &(0x7f0000002540)="39d82a0bdfea6889e977de08f9f24c37ce114daee9642276e3aac8a3250a6a103a5f88cd61267e5f962062df7b952752a81b7e9b529da345301ba65cff7c4be5b9659ae10f0f008ec923e953e005ec88c898b8889556015b485c8115f9e02e5e6df13de56c887e56ea6f136857e67e0f0e1a9cb3d88243694d88640d494dd4fe13a976ae354ae215bc2f28f08f0cc062a6200efc7f661f3b8c92c75cd94e463ed770b2a9b8614120571064e0a5211dce6fa7a337a29da6894395d45e373c2873e1c3069cedbd46864afb6f9d", {0x8000, 0xb0, 0x29363c55, 0x2, 0x2, 0x1, 0x8, 0x8}}) recvmsg$kcm(r5, &(0x7f0000001340)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/222, 0xde}], 0x2}, 0x40000120) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000013c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r7, &(0x7f00000024c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002480)={&(0x7f0000001400)={0x68, r8, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x191b72aa}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x40) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 07:26:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f00000000c0)={0x6, 'wg0\x00', {0x8782}, 0xfff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002500)='/dev/cachefiles\x00', 0x80002, 0x0) ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000002640)={0x4, 0x4, &(0x7f0000002540)="39d82a0bdfea6889e977de08f9f24c37ce114daee9642276e3aac8a3250a6a103a5f88cd61267e5f962062df7b952752a81b7e9b529da345301ba65cff7c4be5b9659ae10f0f008ec923e953e005ec88c898b8889556015b485c8115f9e02e5e6df13de56c887e56ea6f136857e67e0f0e1a9cb3d88243694d88640d494dd4fe13a976ae354ae215bc2f28f08f0cc062a6200efc7f661f3b8c92c75cd94e463ed770b2a9b8614120571064e0a5211dce6fa7a337a29da6894395d45e373c2873e1c3069cedbd46864afb6f9d", {0x8000, 0xb0, 0x29363c55, 0x2, 0x2, 0x1, 0x8, 0x8}}) recvmsg$kcm(r5, &(0x7f0000001340)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/222, 0xde}], 0x2}, 0x40000120) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000013c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r7, &(0x7f00000024c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002480)={&(0x7f0000001400)={0x68, r8, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x191b72aa}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x40) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 07:26:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) listen(r1, 0x8001) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900), 0x0, 0x4080) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x68000000}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x80000000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000180)={r4, 0xd0ac, 0xffff0001, 0x1}, &(0x7f0000000240)=0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f00000000000000) 07:26:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000689009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x5, 0x181b11f0af729216) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/wireless\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000100)=0xf, 0x4) 07:26:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0xff01000000000000) 07:26:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 07:26:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r2 = accept$alg(r1, 0x0, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000240)={0xfffffff8, 0x3, 0x4, 0xe000, 0xbab, {0x77359400}, {0x3, 0xc, 0x0, 0x1, 0xcc, 0x3f, "b3951df5"}, 0xa5d, 0x3, @planes=&(0x7f00000000c0)={0x6, 0x7, @mem_offset=0x2, 0x7}, 0x0, 0x0, r2}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000180)={0x101, 0x10000, 0x0, 0x101, 0x4, 0x80000000}) 07:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000300)=0xa1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000000008000"}, 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x400) write$P9_RSYMLINK(r4, &(0x7f00000000c0)={0x14, 0x11, 0x2, {0x20, 0x4, 0x2}}, 0x14) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f00000001c0)={@remote, @multicast2, @empty}, &(0x7f0000000200)=0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x505501, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r7, &(0x7f0000000080), 0x1c) r8 = dup2(r7, r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r8, r9) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r10, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) getdents64(r10, &(0x7f0000000340)=""/43, 0x2b) getpid() fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0xd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r5, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x83, 0x0) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r12, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r13}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r12, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0, r13}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r11, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r13, 0xa}}, 0x10) 07:26:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 07:26:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000002009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0xfe01, 0xc8, 0x4, 0x3}, {0xe71, 0xfe, 0x42, 0x8}]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) 07:26:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000e00"}, 0x1c) 07:26:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x3f00000000000000) 07:26:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x4) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r2 = dup3(r0, r0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000240)={0x0, @bt={0x0, 0xffff, 0x1, 0x2, 0x1, 0x8, 0x7fe, 0x9, 0x6, 0x1f8a, 0x3, 0x6, 0x800, 0xab6, 0x4, 0x10, {0xc6, 0x3}, 0x7f}}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 07:26:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0xffffffff00000000) 07:26:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000f00"}, 0x1c) 07:26:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = getpid() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x268000, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000300)={0x54, 0x4, 0x4, 0x7, 0x9}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC=r1, @ANYRES64=0x0, @ANYPTR64, @ANYRESDEC, @ANYRES16=0x0, @ANYBLOB="42be7b61c955e3baf1e8739c2ab1de6e15a45d0e8ab92a3259e7d48100f6bcb700000a3cd3cd4662f55f29e48e94376579ba301dbef100434b0d23359f5b99e19de44db5a73bcc2cc6d7351af40b0f6d08335efb6213077a86155de87acb1f28787b28d9d3c0b5897c65f4b2abba9da5a2f25924db487c63406937e69559cd9f85e0f4ee7734bdcd4d17d62030f40ccc84bcc87e062d1bfa31f98f12b898e8137e8d6841c97866502bb3ef3cdbcb65d6f72c084b650df6201608afead8499aeb22f942f7ac564c4989d3635edad6224ece2765bab287c90848cf02b2cc260d36edcfbfe379c9", @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="e4e5aa838f5fae9a56b8e21f2756c89a961b82d1213ccbed149f862e539f16ce2ba612bccceaef35919f0eae3c8b5aa16eaf723ed8297dae8f5e631a638239d032a31127ecc28f130d16a61e541513e2", @ANYRES32=r2, @ANYRES16]]], 0x2) prctl$PR_SET_TIMERSLACK(0x1d, 0x6) 07:26:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getpid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000008009f84bb57964bbbbbbbbbbbbb86dd604279eb009c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d9e4b2768234db23b4cf45321c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc46df460b16e378a543bdc1718ac01a4e165a21de0e02662e3b0027f986be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af180000"], 0xd6) 07:26:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000001000"}, 0x1c) [ 1266.115300][T18612] ================================================================== [ 1266.123547][T18612] BUG: KCSAN: data-race in padata_find_next / padata_reorder [ 1266.131013][T18612] [ 1266.133352][T18612] write to 0xffff88811ff696e4 of 4 bytes by task 9675 on cpu 1: [ 1266.140993][T18612] padata_find_next+0x1d0/0x250 [ 1266.145878][T18612] padata_reorder+0x18f/0x280 [ 1266.150576][T18612] padata_do_serial+0x171/0x1a0 [ 1266.155448][T18612] pcrypt_aead_enc+0x49/0x70 [ 1266.161704][T18612] padata_parallel_worker+0x1af/0x220 [ 1266.167087][T18612] process_one_work+0x424/0x930 [ 1266.172058][T18612] worker_thread+0x9a/0x7e0 [ 1266.176576][T18612] kthread+0x1cb/0x1f0 [ 1266.180657][T18612] ret_from_fork+0x1f/0x30 [ 1266.185065][T18612] [ 1266.187398][T18612] read to 0xffff88811ff696e4 of 4 bytes by task 18612 on cpu 0: [ 1266.195038][T18612] padata_reorder+0x1c9/0x280 [ 1266.199722][T18612] padata_do_serial+0x171/0x1a0 [ 1266.204577][T18612] pcrypt_aead_enc+0x49/0x70 [ 1266.209302][T18612] padata_parallel_worker+0x1af/0x220 07:26:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x780f}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) clock_gettime(0x3, &(0x7f0000003540)={0x0, 0x0}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000010c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000100)="57317bb142d788e69a56db", 0xb) accept$alg(r6, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000004880)={0x80000000, 0x7, 0x4, 0x1000000, 0x80000001, {r4, r5/1000+30000}, {0x2, 0xc, 0x4, 0x8, 0x1f, 0xff, "cf6dde5a"}, 0x629, 0x2, @userptr=0x10001, 0x7ff, 0x0, r6}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r7, &(0x7f0000000080), 0x1c) r8 = dup2(r7, r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r8, r9) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r11, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r11, &(0x7f0000000080), 0x1c) r12 = dup2(r11, r11) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = dup2(r12, r13) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r14, 0x6, 0x22, &(0x7f0000000440), 0x2000021c) ioctl$KVM_GET_SREGS(r10, 0x8138ae83, &(0x7f0000004a40)) sendmsg$alg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000240)="b494d8bcda955cff010e51b81e1fe484df1441da129e85200a7eaeffa86856cfc8c53063f61e780b85acb77bf822b8cbc61c423ca5f184d687b58c94c78b158369ceea4dd57d5ec1a6216c9b690420b1f171a00509f22630c14b832c9ba54826f4f50c52f74f33aac34402454e", 0x6d}, {&(0x7f00000002c0)="211c88a5aab7717f0e4af702bdfcc179d2a1984163a88b4d232f763d9c5acad495f19f282efa1ecf413ee2d1da99668e8788849e7858cd510b3ca60bbc3720a4e20e0eedbe25e8ff06dfec5ba589baab43e28d2340d064491db7416061d1a71b2feef0e8ab687205738282ffe8eea0553e1b93629b2cda5db55532225872628c8e3a81b8f1ee2b61bc2f7427a9de646409cb465c61754584993930da9bdf8567a97d3025c6fa005fc08801d35c3ba1ed4c2647ab6fee6903cad118911f60116f5ac754e8aea1c9a332faa4f840629cfb9329382833124a8a5ab141f6fc1c7416ae49c801b31a926230155fbe319576629286acf968ecdda3", 0xf8}, {&(0x7f00000003c0)="1e97c6a7cf306d4f9c5e3f25fe88907ded9430c897b064685c07de8384695ed1c5668b28e007b50f201017cc7e309d3af8e22c645510099f2f11de398a22be492ece1063b5b8adef2ccd0ae50040d46f243d7ca7f9fccddf7d76c064b162b920d65b80d44288fc218bc28c26190a06f6116e407dd134780aadb9189c9d19167b016813b76d76560c3918d4b5ae5f08a482fe5159", 0x94}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000000100)="afd899c8157a01cca8ea25b93afb9faae1b2c6934ca67db8349a1514dfb4c50823eb9d73fd00b151f4bb", 0x2a}, {&(0x7f0000002480)="5330fca4d7d0c8ae4c9ac54efef79194245fa0dfd8ea7568428257a72a023c216c8e1faf4e630cb1db9a5a56153036e8f8eaecdac350a2ef31d5f256164771cd6408caeff1f8bbcd8f7f04d2336a9133771ecfa481937ff77c9035f172f154a16ff95bd8c2f473173b7a1f5bdb21756ee421fb07d3dc2b03165f491b1abd5762dfaff42a3c58282591243bd7ff23e48b85c871a4bbf7f54fdedc909a152007c1d621f18ddea967955933eb4db6a8535a681e0ae8bd46938e4b3c2bf5427715c3f87d140dcfd4b19309d3e797527f6a0f23d585d3c2a31cae81a676d723bab778c47377859d4f5875ab15f136bb1cc32b71d7e43d118a6e0ae89e75e96fe494c92d6b013a19f1bcb0cff8f70c079d5bd07cdab7956d0084016893a6d6ded8290415f4bec387632a4e2277754bcef628106a4fd8f684bde2a3a9d7770810b2d64e15c128553e6a413603aac6c27199f4f31707d832fc254a5aab2ad7665075dd48f8691fc6ba94d28843b39336645420fc1661c2a85fd3de9601366ae40b88d8444449ce1c37a70b6cd75c5d1d46ef7e5f6e01a93384b93c8d088579c400a9261d9000280ef3fc7a6edf9d8e3fd4e9ceadae5485f896e146712e9f04e1030c08c8224f88c7baec8e8455f2a59e911912096c62551ba6efb0af6558b76e30b8d2ac898a8b6e0caaa51b82346da04eca253296514aeb64bdfea772b35ec8df97b1be99c6551456af182fa186c2bbe5598dc1c4b16494d7bc43b9ccbf9573c422a56bbadcbfbacdfff8ff57cf73280473e9fd4940a3975d4f79a550ef205f71883123af14308bbd170a8820620c111e25918b141de414f3b26842e8559e812a6e02482314abb002c5d497f47078d65ee20a02a89949f8b030fd150a9a5bbe38a1768d8b3511100b6b85b9315b8d7f144270d12f3124916dd9973d42cab27464b8bce26739f09a2b4086cb0d0d58ad2f92dc9e3b60a4a9a173f3f6ff158f0030298b3da70a2d48ed0af881eb4dfbdf02787bedea1d565ba4e5f0a5e49f0ec05ce97bf1b9608c9173cf1442d3a02fb69215435774fb2e466601f983f712ce83c1558cfc5487df2994cb5357da5e00157133f219dda3ae135bea3d636ccc7c0432fa1d853fd9bf336889504d8cb357e7f22f32c94140b0815deaae79a6cda797e2bcecad71c1c541e7b5c525ba4225db7c34b3a2fa935241162c22f326954c7bf6b2efbef61558fd06af62373ae062a51f863f7e23dba919b187c73c2a9b4757ae88e720f6675dd05cdb7f208d7fe629b561b1e0dc642c95ceed0e2f91a8649e31eb918692578662fbaf109ae7098c240e58abd3e9406bedc0769a32f5e474a8230ddbd5075a265f3e74fb37aa934bf4555126a19e6ab28c1bcba0fab856320668dbbdbf37b83a8e03b052c70141bc54afdb49eaf36294104baf5c1dc74d653060b832d4579d092243e170d9218651a36c8f033b50d980760ada3c81f6df3f032179fb1469656b68ffe96e9256116b0e1d450489e794f565231939b5a54421889fc4dcbc54ccaebc2c030630ad146df56207ee82ffbbac29ffe55d37d8190a05722df34d6950a7a9f02e5bc379e95131d58374b3705ba92fba4a692ff7d05326c8c5f2f95be2957619a9861e0b9ec34bca978630609afeba1fd580cf0faddf57b2e68460f40df0e9add8762f929db983c3c376a5a4776c7a1463f1f8ef858bb79310a1cfe795f06db3940d8fa26ebad28b2e0f836e5053d78f3b8906d205518495cbdfb1d7b07abef8a184d25545d64749d8acecf15b4aa7689aed9492b4b6200d6bbeb023e3fdc050d27b692b20fb95c33c566e34fb46ab9537d76fefb08682ccf7ccaa457d216d81035c28cff1be417c9c66e632c0c1104ef08f523264d1c7f79937bdea74266935375b0c56d5fab49ee31c51b7821314be2687fe437c972e4aee04420adfe441f5523d3895d82f7b386547d0f0186302942d92c790f6ed842cf309b38d2f8f12b90b97f6e34fb74555fb8e33390b63f361c7232cecb236a607b645f7f126dbe570e4fa3b1135885b8b66897ff3464e0616d0cb9dc5de19af35b2826cbafc757229779b2cd8522baa3dd28fc4aa91afa1f57ad1382ae9c5695b724e05eacb20afb20e5c1686b82f06e646abbb16034648ab07d1167abae30732da5f3f4478bd45577835d49d1ed8c479b83fa8f08fd1bd36eb04704e9fc91ea29e125ec85b5a841f916e82023ba4dbd4f2996b14f80a3d3822fd147f01f8271d395c9e9e6c4fc4c0a0b89094eeb981a240842a207e8472199155235abc065b6cd0b873eec0a556f52e00a884952004bd4d2a541c8a56ef1c32d43417d5db50f53479b1365c8163ec02c0e8d9fb040bc9307df0488395b22bf2c13d3a05d7570a32b7e2ffe8c890f667f8d1415aa898aef63944b39e50dbcbcd1cd2551c3afb897eb3f2cf9bef3f35719445861710ee33a966f2c8632b30bc93a693fc2b78f36f2fcceaa64008c84b7b99ddd6ee359000e1a2afa0e985408433de6bc3650fe2ed6aa69fc906edf321223663b3343da7cba87f03b7b0f2d2a94870255a28d56bd51a88273de1fd8452447aa6df0972544db12180ae1c32eac0a897418854c039a6b3a4711b8fb602dfbdf4535a554842ffc9264ef9e914b75fae354a454b0ec6ec61f1a80e1d3fd54494fb80435551c997c33fed6f346b3a8dcd9eef580a18ecfc8af86fd23df7d7f2785ba426d61658ed5c1aac71f76ccf537b55f24cabc3fca500ee67656eeccaea86fe171335b9753b26836e6513fc86b67e653b4dd888f287b239432498df452e0805b2aa84987260d04fa40a329e836dc739243b749b3ce23c5df4225776e43b548989e2b371ceeefd6306f60a34698f6ea885900d953d4745d994d67bcff5247e6ff0a04bc19b4976e99ae6170d04c3edbffc42cde373594d153aff2c231c4a4474497785d3133e64de33b8ec83f2ff237ca590a472cdc79cb60c4ccfcbe5f91cbe1ef9b85aa680526fba7561d86209b0d36e0d3e5d7a1c5f096ac6b72e6b2f9483d3691d10877f2c09e237dfdb75c0490549200d74f367aa210849cab98accfc50a02bfde6ecdf95f50d68dd7b30f9f08ddaa51efd34914afab819c0bc2d700b0ceae0062c663c292a0fe6eae1055c3fa958d419902646f49a712f0a69f2b5b626e9d16edc4640b10755cd7a87fb77023c1c8786d58ea6da8185018b958a862daf13204080656d5f2da577b70aa1d6fc92c38fb90b7c00a6e063eebf9b2bd08840e9df38a64333808a8c3226579ac24150c40cdb464a1afc68b835d55742755832451352bc171dbf3fdd9e2b5de0aff1d87074f07942420a4f8573c0b5ce6d99005293c53572af6a4c56f6d10f5019d7888183099a471126f138c16355f984401387a24be528239c62c01bb88ad8b4a0baddfb3f89e5a2075447c334642db93bf0e4539261c1a4892ad0247cb57a33643dd8f5eb368d9f8406119c1fdf5beded43e730ee60fdfeb898f3a12d781cdba6555136efcc19c72ed1382d25bf269957c0edae25e228e985e20aa69a45f6c053a67ff4e95bd8d03921da93c4517a74d3a662f39edec2eac086f37d6d5be906dc20fcbee33c25655bc792146382f427d514a5f9482e47a383144676eb4551a936c38dc2682b2df66cc3af24116b85a3c8f3fb48a54ea71b69a172ebd459c40aaf7c6eb9ae8f9e537ab4623514109834397bba24e6be6840a6104690a82a453d161e906029027cb888fe22d2c5c734ce88c729cd44a4e3befac1d74fcf6719e7443c565486be3e7538d662ed3fd5d41d28e93163cf52c74a813a0c344626635135e08089c560295e5b96769fef61ae96f18236915092b6df0e3e7b727581e90bc15c51268d697d5c07235faad099a7b15f79bf6f46774c46d0100918089b806f9ea1e0fa22184ad20b8d2bd45f2511f210f4d17cdbd53a6ec6468ab70ef54b6b01ad4c81f0d2700de4799fb43a9bccf413c70102eb49794f906bad7cf568de34d12ee8bf896e753b3df54350dfddfb08cf2094fb9faf6cdffec19029ac0de388e0e47a811d33f4819defa2fe815edff1b9c29caf3a14fcfd801f2b193fb5e795c7fd0a733062bf0e2109fe052bd3fbcd7d00fec9066d36fc431530482a608a751f4cd404148fbfe026b3f6ada612dd711a8950a9119ddcfeb515758e4a1f84c5f5995e21dc1195d19a06aecde91594fc52887446be380f93aab28c48ae3f7b851f7305402c97a3ddd14600dfc86f06291f48ff9d0bb58c1abfc73e1834a94d486b3d75fef82c19539a17d43e7d3655bb5f83f4735ce3bdd4fcdbb2a789d958762fe9e9bdb26875be75d7e3a99769e239aee9de3be2edd028a6d81bcc2c5777724a64fdf0cf0510a721c998d33b1b0236f5bfdc0ea1b157fa1d479bde96d59e4eae4e157e567880a500d955557b2781b72f42d81860e01eb507906d10596a65bc12b68180eb607958c412348f9c34ddbcaa6cf652a277064322677fe94b7d7c31910bc267f43363a3bff23a42b4af0352681b947a52bbaa2882999fca066b1c8cee8843ff38aff156b2174a899ee354be40afbe45e045523be2e09756f82e53ab1be3e99d493bf09891cc855210e30e034d48404ae510559e9ea896cf46e1564a66759d865b492ac4f122b47eed09c676329ca04450c0769a8ea64c1a65e0878b9ce00cbad38542186a737ba20937704af8667b394f694883fdf14a582b8075a395000f6ba4604ad74b0582ec66d408d6eb0ad344681b4be1b82be2a16fbc8ba0d7d5bafe26ec846388491cfb04a8c8af4280caf05391e646eb8a90634ac69283657bc4c8ebd0ed022fa644a8ac255f788313b96dc964af0ac3728f29f77a69aeeb922b7fc018b3433866b75ec746854c522607611760136265501ce74f9838e337e39cb2ad473c471825972029e65cd64f8a377d1335ad7176de318a3e86781bbb4a23efa89f537344e0e6c32af3fbd0ab1aacef0a7f3734aec214afb29b582e4f214c54d9a4f17c5195563de2235370d4b61eae243848e0da66b0fe9d72cebb1090bd7d55e59110a13d743530faddd9141027cbf2e218eccbf7bc2ae284bd90bdfda7a7d1f34719cafed012c831aa94ec959d1b20317a0a9f8a1db795b31c73136108cc70826fe5f98c695fd7c478ea23cc4917e2e4c0813e3af0a5d55c1ef8992c3d7d59c8505c1ecf3428cd2c00416c43b7a6b6bbf894da4b7371ff2398aadd81048972da0cd1d45c46ca44f9b05e6ec7a0cd311813d18bd4444e346695349b67a45eda9705133bbaa5970ed14f672610fcfc92cbfc43d88536f18b8fa36e8cd10a23dd8d8e7184aa6dcdbf1b432287b19dc667aee376dac4ca3140a6258cdc6e82a0236e23f726e805c95fb6eec149e49b9e1083cc7315f0605da8feaf41f918b5575e158efbf725ef4fe1f1300f6bcfd59dc2a82174f138946c6483a5f9bcfdad7006e37baab85049cc0df0870ad8fe478cb72791e6c261cd16f41e7c100a8a1cf9644bf56c2c53080bc05c2a4e0fb4a5588ce71dfe8c45a7ce405f4f14cb30871c9c24fd2bf5badcf9dd46a7165f14658de7a14c4e4e68285fa842d096417cae5b060193449a5d38da4507fa83b4b0c56da5bebbc5fcb6fdb587cf9a883428c5c7bab67b9b1aa7cf48f6fd15d7b46658f7f0c1def19ecc1ef05ea154b4e3ead8e7cc80ce2cea1c2ee217ea082782463ed4888d9752e413d4654728ca2eb5b3315dde1bf11cdc92239278c5f378b2e4d0990136d1884742d05561979926a5e69749e54ccae598ad11", 0x1000}], 0x6, &(0x7f0000004580)=ANY=[@ANYBLOB="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"], 0x110, 0x4000000}, 0x40804) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sigaltstack(&(0x7f00008d8000/0x3000)=nil, &(0x7f00000000c0)) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1266.214685][T18612] process_one_work+0x424/0x930 [ 1266.219544][T18612] worker_thread+0x9a/0x7e0 [ 1266.224062][T18612] kthread+0x1cb/0x1f0 [ 1266.228147][T18612] ret_from_fork+0x1f/0x30 [ 1266.232556][T18612] [ 1266.234984][T18612] Reported by Kernel Concurrency Sanitizer on: [ 1266.241153][T18612] CPU: 0 PID: 18612 Comm: kworker/u4:10 Not tainted 5.6.0-rc1-syzkaller #0 [ 1266.249851][T18612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.260040][T18612] Workqueue: pencrypt_parallel padata_parallel_worker [ 1266.266806][T18612] ================================================================== [ 1266.274875][T18612] Kernel panic - not syncing: panic_on_warn set ... [ 1266.281601][T18612] CPU: 0 PID: 18612 Comm: kworker/u4:10 Not tainted 5.6.0-rc1-syzkaller #0 [ 1266.290186][T18612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.300262][T18612] Workqueue: pencrypt_parallel padata_parallel_worker [ 1266.307019][T18612] Call Trace: [ 1266.310342][T18612] dump_stack+0x11d/0x187 [ 1266.314691][T18612] panic+0x210/0x640 [ 1266.318610][T18612] ? do_one_initcall+0x48/0x3f0 [ 1266.323471][T18612] ? vprintk_func+0x89/0x13a [ 1266.328075][T18612] kcsan_report.cold+0xc/0x14 [ 1266.332767][T18612] kcsan_setup_watchpoint+0x304/0x400 [ 1266.338153][T18612] padata_reorder+0x1c9/0x280 [ 1266.342887][T18612] padata_do_serial+0x171/0x1a0 [ 1266.347748][T18612] pcrypt_aead_enc+0x49/0x70 [ 1266.352350][T18612] padata_parallel_worker+0x1af/0x220 [ 1266.357745][T18612] process_one_work+0x424/0x930 [ 1266.362622][T18612] worker_thread+0x9a/0x7e0 [ 1266.367144][T18612] ? rescuer_thread+0x6a0/0x6a0 [ 1266.371999][T18612] kthread+0x1cb/0x1f0 [ 1266.376076][T18612] ? kthread_unpark+0xd0/0xd0 [ 1266.380766][T18612] ret_from_fork+0x1f/0x30 [ 1266.386657][T18612] Kernel Offset: disabled [ 1266.390986][T18612] Rebooting in 86400 seconds..