40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) [ 419.926143][ T5346] EXT4-fs (loop4): unmounting filesystem. [ 419.987086][ T7548] loop5: detected capacity change from 0 to 32768 [ 420.002516][ T7548] BTRFS info (device loop5): using crc32c (crc32c-intel) checksum algorithm [ 420.011542][ T7548] BTRFS info (device loop5): using free space tree 04:04:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, &(0x7f0000000000), 0x1, 0x763, &(0x7f0000000fc0)="$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") 04:04:45 executing program 1: io_setup(0x5, &(0x7f0000000580)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000700)={0x0, 0x989680}) 04:04:45 executing program 1: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) r0 = syz_io_uring_setup(0x577d, &(0x7f0000000000), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x8000000) [ 420.324324][ T7574] loop3: detected capacity change from 0 to 2048 [ 420.348704][ T7574] EXT4-fs (loop3): blocks per group (262184) and clusters per group (16384) inconsistent [ 420.369572][ T7548] BTRFS info (device loop5): enabling ssd optimizations [ 420.382890][ T7548] BTRFS info (device loop5): auto enabling async discard [ 420.481264][ T7548] BTRFS info (device loop5): balance: start [ 420.495061][ T7548] BTRFS info (device loop5): balance: ended with status: 0 04:04:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000480), 0x4) 04:04:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING(0xffffffffffffffff, 0x4068aea3, &(0x7f00000000c0)={0xc0, 0x0, 0x2000}) 04:04:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:46 executing program 1: r0 = syz_io_uring_setup(0x1378, &(0x7f0000002d00), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000002d80), &(0x7f0000002dc0)) io_uring_register$IORING_UNREGISTER_IOWQ_AFF(r0, 0x12, 0x0, 0x0) 04:04:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x802012e4, 0x0) 04:04:46 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000400)='ns/cgroup\x00') 04:04:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/key-users\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000000)={'tunl0\x00', 0x0}) 04:04:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING(r1, 0x4068aea3, 0x0) 04:04:46 executing program 5: add_key$keyring(&(0x7f0000000280), &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 04:04:46 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x3) 04:04:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0xc03012f3, 0x0) 04:04:46 executing program 5: openat$incfs(0xffffffffffffffff, 0x0, 0x109001, 0x0) 04:04:46 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000003b80), 0x2, 0x0) [ 421.137090][ T7615] loop4: detected capacity change from 0 to 2048 04:04:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING(r1, 0x4068aea3, 0x0) 04:04:47 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/22, 0xfffffffffffffeff}], 0x1, 0x0, 0x0) [ 421.246057][ T7615] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 421.287389][ T7615] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/114/file0 supports timestamps until 2038 (0x7fffffff) 04:04:47 executing program 5: r0 = open(&(0x7f0000000900)='./file0\x00', 0x40, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(r0, r1, 0x0) 04:04:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127b, 0x20000000) 04:04:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) [ 421.515884][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING(r1, 0x4068aea3, 0x0) 04:04:47 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc01047d0, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) 04:04:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/key-users\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x8971, &(0x7f0000000200)={'sit0\x00', 0x0}) 04:04:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:47 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000001d80)) 04:04:47 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 04:04:47 executing program 5: select(0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x0, 0x2710}) [ 421.883121][ T7654] loop4: detected capacity change from 0 to 2048 04:04:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89b0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 04:04:47 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 04:04:47 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) [ 421.976532][ T7654] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 421.992604][ T7654] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/115/file0 supports timestamps until 2038 (0x7fffffff) 04:04:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING(r1, 0x4068aea3, &(0x7f00000000c0)) 04:04:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x400c12f5, 0x0) 04:04:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:47 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 04:04:48 executing program 3: memfd_create(&(0x7f0000000000)='C,\x00', 0x4) [ 422.223886][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x1263, 0x20000000) 04:04:48 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x0, 0x8}, 0xc) 04:04:48 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 04:04:48 executing program 3: setresuid(0x0, 0xee01, 0xee00) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING(r1, 0x4068aea3, &(0x7f00000000c0)) 04:04:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x0, 0x3, &(0x7f0000002140)=@framed, &(0x7f00000021c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:04:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, 0x7}}) 04:04:48 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x105000, 0x0) [ 422.574868][ T7695] loop4: detected capacity change from 0 to 2048 [ 422.707882][ T7695] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 422.725256][ T7695] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/116/file0 supports timestamps until 2038 (0x7fffffff) 04:04:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', 0x0}) 04:04:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000100)={0x0, 0x0, 0xbe78, 0x0, 0x0, "d9d7f4c3f291865a"}) 04:04:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x407012ef, 0x0) 04:04:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING(r1, 0x4068aea3, &(0x7f00000000c0)) 04:04:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x8}, 0x48) [ 422.903712][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x2c}}, 0x0) 04:04:48 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000340), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000003c0)={0x0, 0x1, [{}]}) 04:04:48 executing program 5: syz_open_dev$vcsu(&(0x7f00000006c0), 0xffffffffffffffff, 0x0) 04:04:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000015c0)={'gre0\x00', &(0x7f0000001580)=ANY=[@ANYBLOB='sit0\x00'/15, @ANYRES32=0x0, @ANYBLOB="0700ee1f"]}) 04:04:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) [ 423.262676][ T7733] loop4: detected capacity change from 0 to 2048 [ 423.265483][ T5498] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 423.314845][ T5498] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 423.347019][ T5498] Buffer I/O error on dev loop4, logical block 0, async page read 04:04:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:49 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffa) 04:04:49 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x401012fc, 0x20000000) 04:04:49 executing program 5: select(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x2}, &(0x7f0000000340)) 04:04:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @ptr]}}, &(0x7f00000007c0)=""/189, 0x3e, 0xbd, 0x1}, 0x20) 04:04:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 423.388259][ T7733] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 423.397228][ T7733] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/117/file0 supports timestamps until 2038 (0x7fffffff) 04:04:49 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 04:04:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:04:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8901, &(0x7f0000000200)={'sit0\x00', 0x0}) [ 423.479803][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:49 executing program 3: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 04:04:49 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000240), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}]}) 04:04:49 executing program 3: socketpair(0x26, 0x0, 0x0, &(0x7f0000002b80)) [ 423.949559][ T7764] loop4: detected capacity change from 0 to 2048 [ 423.979043][ T7764] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. 04:04:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:49 executing program 5: syz_emit_ethernet(0x400e, &(0x7f0000000380)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 04:04:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000000)="740ae12d", 0x4) 04:04:49 executing program 1: socketpair(0x10, 0x2, 0x1, &(0x7f0000000000)) 04:04:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c00, 0x1ffff000) 04:04:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 423.987728][ T7764] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/118/file0 supports timestamps until 2038 (0x7fffffff) 04:04:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x5421, 0x20000000) 04:04:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8930, &(0x7f0000000200)={'sit0\x00', 0x0}) 04:04:49 executing program 5: clock_gettime(0x6, &(0x7f0000000140)) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) [ 424.124544][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:49 executing program 1: openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x200000, 0x0) 04:04:50 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x7f}, &(0x7f00000000c0)={0x0, 0x2710}) 04:04:50 executing program 3: socketpair(0x2, 0x2, 0x3, &(0x7f0000000040)) [ 424.535265][ T7795] loop4: detected capacity change from 0 to 2048 [ 424.544725][ T5498] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 04:04:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$eJzs3M9rHGUfAPDvTLP9mffdvPAe1IMILbRQOkmaS3uLF2+FQsFrDckkhJ3NhuymdmMPrWehNggKgujdo1eh1D/AmxQ8eBdEazyIl8hsNildd9O1TbpSPx+Yne/zzM5+n292eLID+2wA/1pvlA9JxHhEXI2Iarc/jYijneh4xO2d5209ujVfbklsb1/7OSlP6/TtvlbS3Z+KzinxSkQ8qEScf/+veZvtjdpcUeRr3fZkq7462WxvXFiuzy3lS/nK9MzlqUszM5emZg6s1jNvXz5x79u3Nje/+6p19/WxC0nMduqOnjoO0s7fpBKzPf0rh5FshJJRDwAAgKGUn/OPRMRY51NqNY50IgAAAOBlsn1sGwAAAHjpJTHqEQAAAACHa/d7ALtrew9rHewgP70ZERP98o911hBHHI9KRJzcSp5YmZDsnAbP5fadiLg/2+f6S7rX37Ob6mlbI/3Pc7+cf2b7zT/p3vwTfeafsd3fTnhOg+e/x/mPDJj/rg6Z4+vPXq0MzH8n4rWxfvmTvfzJgPzvDJn/7uYH9wYd2/4i4mzf/z/JE7n2+X2IycXlIp/aeeyb48Ef5x7uV//JQfmT/etfHbL+97Z+rQ2aS8r8507v//73y19eEx92x5FGxL3uvmxv9uQ4Xf/+m/3qXxhQ/9Pe/8+HrP+HL4/dHPKpAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0JFGxHgkabYXp2mWRZyKiP/HybRoNFvnFxvrKwvlsYiJqKSLy0U+FRHVnXZStqc78eP2xZ72TET8LyI+qp7otLP5RrEw6uIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYcyoixiNJs4hII+K3appm2ahHBQAAABy4iVEPAAAAADh07v8BAADg5ef+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgBrl65Um7bW49uzZfthRvt9VrjxoWFvFnL6uvz2XxjbTVbajSWijybb9Sf9npFo7E6fTnWb0628mZrstneuF5vrK+0ri/X55by63nlhVQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3zXe2ZI0i4i0E6dplkX8JyImopIsLhf5VET8NyIeVivHyvb0qAcNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAgWu2N2pzRZGvCQQCwV4w6pkJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBRaLY3anNFka81Rz0SAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARiv9MYmIcjtbPTPee/Ro8nu1s4+Idz+99vHNuVZrbbrs/2Wvv/VJt//iKMYPAAAA9Nq9T9+9jwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABhWs71RmyuKfO0Qg1HXCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJs/AwAA//9oSMpK") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(0xffffffffffffffff, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 04:04:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f00000007c0)=""/189, 0x32, 0xbd, 0x1}, 0x20) 04:04:50 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 04:04:50 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) [ 424.593145][ T7795] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 424.601873][ T7795] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/119/file0 supports timestamps until 2038 (0x7fffffff) 04:04:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x5, &(0x7f0000000080)="02", 0x1) 04:04:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) [ 424.688496][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xef) 04:04:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x1, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev}}}}) 04:04:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f0000000280)=""/212, 0x0, 0xd4}, 0x20) 04:04:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x400c12f5, 0x20000000) [ 424.969071][ T7817] loop4: detected capacity change from 0 to 2048 [ 425.045399][ T7817] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 425.064789][ T7817] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/120/file0 supports timestamps until 2038 (0x7fffffff) 04:04:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(0xffffffffffffffff, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:50 executing program 0: clock_gettime(0x3, &(0x7f0000000540)) 04:04:50 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f00000034c0)={0x0, 0x0, 0x18}, 0x10) 04:04:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000015c0)={'gre0\x00', &(0x7f0000001580)=ANY=[@ANYBLOB='sit0\x00'/14, @ANYRES32=0x0, @ANYBLOB="0700ee1f"]}) 04:04:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), 0x14) 04:04:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) gettid() process_vm_writev(0x0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x9}]}) 04:04:51 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000340), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000003c0)) 04:04:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/key-users\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x8918, 0x0) 04:04:51 executing program 0: clock_gettime(0x3, &(0x7f0000000540)) [ 425.263001][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127d, 0x0) 04:04:51 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0xa0801, 0x0) [ 425.531044][ T7845] loop4: detected capacity change from 0 to 2048 04:04:51 executing program 0: clock_gettime(0x3, &(0x7f0000000540)) 04:04:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 04:04:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='{'], 0x64}}, 0x0) 04:04:51 executing program 3: socket(0xea7495198e631fb1, 0x0, 0x0) [ 425.694487][ T7845] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 425.718072][ T7845] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/121/file0 supports timestamps until 2038 (0x7fffffff) 04:04:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$eJzs3M9rHGUfAPDvTLP9mffdvPAe1IMILbRQOkmaS3uLF2+FQsFrDckkhJ3NhuymdmMPrWehNggKgujdo1eh1D/AmxQ8eBdEazyIl8hsNildd9O1TbpSPx+Yne/zzM5+n292eLID+2wA/1pvlA9JxHhEXI2Iarc/jYijneh4xO2d5209ujVfbklsb1/7OSlP6/TtvlbS3Z+KzinxSkQ8qEScf/+veZvtjdpcUeRr3fZkq7462WxvXFiuzy3lS/nK9MzlqUszM5emZg6s1jNvXz5x79u3Nje/+6p19/WxC0nMduqOnjoO0s7fpBKzPf0rh5FshJJRDwAAgKGUn/OPRMRY51NqNY50IgAAAOBlsn1sGwAAAHjpJTHqEQAAAACHa/d7ALtrew9rHewgP70ZERP98o911hBHHI9KRJzcSp5YmZDsnAbP5fadiLg/2+f6S7rX37Ob6mlbI/3Pc7+cf2b7zT/p3vwTfeafsd3fTnhOg+e/x/mPDJj/rg6Z4+vPXq0MzH8n4rWxfvmTvfzJgPzvDJn/7uYH9wYd2/4i4mzf/z/JE7n2+X2IycXlIp/aeeyb48Ef5x7uV//JQfmT/etfHbL+97Z+rQ2aS8r8507v//73y19eEx92x5FGxL3uvmxv9uQ4Xf/+m/3qXxhQ/9Pe/8+HrP+HL4/dHPKpAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0JFGxHgkabYXp2mWRZyKiP/HybRoNFvnFxvrKwvlsYiJqKSLy0U+FRHVnXZStqc78eP2xZ72TET8LyI+qp7otLP5RrEw6uIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYcyoixiNJs4hII+K3appm2ahHBQAAABy4iVEPAAAAADh07v8BAADg5ef+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgBrl65Um7bW49uzZfthRvt9VrjxoWFvFnL6uvz2XxjbTVbajSWijybb9Sf9npFo7E6fTnWb0628mZrstneuF5vrK+0ri/X55by63nlhVQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3zXe2ZI0i4i0E6dplkX8JyImopIsLhf5VET8NyIeVivHyvb0qAcNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAgWu2N2pzRZGvCQQCwV4w6pkJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBRaLY3anNFka81Rz0SAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARiv9MYmIcjtbPTPee/Ro8nu1s4+Idz+99vHNuVZrbbrs/2Wvv/VJt//iKMYPAAAA9Nq9T9+9jwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABhWs71RmyuKfO0Qg1HXCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJs/AwAA//9oSMpK") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(0xffffffffffffffff, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) [ 425.820480][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) gettid() process_vm_writev(0x0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:51 executing program 0: clock_gettime(0x3, &(0x7f0000000540)) 04:04:51 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan0\x00'}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) 04:04:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x2, 0x4e23, @private}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_ttl={{0x14}}], 0x30}, 0x0) 04:04:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) [ 426.032111][ T7862] loop4: detected capacity change from 0 to 2048 04:04:51 executing program 1: setresuid(0xee00, 0xee01, 0xffffffffffffffff) setresuid(0xffffffffffffffff, 0xee01, 0x0) 04:04:51 executing program 0: socket$inet(0x2, 0x0, 0x1000) 04:04:52 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0xe, 0x0, 0x0) [ 426.120110][ T7862] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 426.151633][ T7862] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/122/file0 supports timestamps until 2038 (0x7fffffff) 04:04:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0x4020940d, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) 04:04:52 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x3, 0x0, 0x0) 04:04:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x401012f7, 0x20000000) 04:04:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) [ 426.364397][ T5346] EXT4-fs (loop4): unmounting filesystem. [ 426.570046][ T7889] loop4: detected capacity change from 0 to 2048 [ 426.630174][ T7889] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 426.645369][ T7889] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/123/file0 supports timestamps until 2038 (0x7fffffff) [ 426.721752][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:04:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) gettid() process_vm_writev(0x0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:52 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 04:04:52 executing program 1: socketpair(0x11, 0x0, 0x1, &(0x7f0000000000)) 04:04:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x401012f7, 0x20000000) 04:04:52 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x62e00, 0x0) 04:04:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$eJzs3M9rHGUfAPDvTLP9mffdvPAe1IMILbRQOkmaS3uLF2+FQsFrDckkhJ3NhuymdmMPrWehNggKgujdo1eh1D/AmxQ8eBdEazyIl8hsNildd9O1TbpSPx+Yne/zzM5+n292eLID+2wA/1pvlA9JxHhEXI2Iarc/jYijneh4xO2d5209ujVfbklsb1/7OSlP6/TtvlbS3Z+KzinxSkQ8qEScf/+veZvtjdpcUeRr3fZkq7462WxvXFiuzy3lS/nK9MzlqUszM5emZg6s1jNvXz5x79u3Nje/+6p19/WxC0nMduqOnjoO0s7fpBKzPf0rh5FshJJRDwAAgKGUn/OPRMRY51NqNY50IgAAAOBlsn1sGwAAAHjpJTHqEQAAAACHa/d7ALtrew9rHewgP70ZERP98o911hBHHI9KRJzcSp5YmZDsnAbP5fadiLg/2+f6S7rX37Ob6mlbI/3Pc7+cf2b7zT/p3vwTfeafsd3fTnhOg+e/x/mPDJj/rg6Z4+vPXq0MzH8n4rWxfvmTvfzJgPzvDJn/7uYH9wYd2/4i4mzf/z/JE7n2+X2IycXlIp/aeeyb48Ef5x7uV//JQfmT/etfHbL+97Z+rQ2aS8r8507v//73y19eEx92x5FGxL3uvmxv9uQ4Xf/+m/3qXxhQ/9Pe/8+HrP+HL4/dHPKpAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0JFGxHgkabYXp2mWRZyKiP/HybRoNFvnFxvrKwvlsYiJqKSLy0U+FRHVnXZStqc78eP2xZ72TET8LyI+qp7otLP5RrEw6uIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYcyoixiNJs4hII+K3appm2ahHBQAAABy4iVEPAAAAADh07v8BAADg5ef+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgBrl65Um7bW49uzZfthRvt9VrjxoWFvFnL6uvz2XxjbTVbajSWijybb9Sf9npFo7E6fTnWb0628mZrstneuF5vrK+0ri/X55by63nlhVQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3zXe2ZI0i4i0E6dplkX8JyImopIsLhf5VET8NyIeVivHyvb0qAcNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAgWu2N2pzRZGvCQQCwV4w6pkJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBRaLY3anNFka81Rz0SAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARiv9MYmIcjtbPTPee/Ro8nu1s4+Idz+99vHNuVZrbbrs/2Wvv/VJt//iKMYPAAAA9Nq9T9+9jwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABhWs71RmyuKfO0Qg1HXCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJs/AwAA//9oSMpK") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:52 executing program 1: socket$inet6_tcp(0x2, 0x1, 0x0) 04:04:52 executing program 3: io_setup(0x3e5, &(0x7f0000001700)) 04:04:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x401012f7, 0x20000000) 04:04:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/key-users\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x8936, 0x0) [ 427.090488][ T7899] loop4: detected capacity change from 0 to 2048 [ 427.147079][ T7899] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/124/file0 supports timestamps until 2038 (0x7fffffff) 04:04:53 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001e40), 0x0, 0x0) write$vhost_msg(r0, 0x0, 0x0) 04:04:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$eJzs3M9rHGUfAPDvTLP9mffdvPAe1IMILbRQOkmaS3uLF2+FQsFrDckkhJ3NhuymdmMPrWehNggKgujdo1eh1D/AmxQ8eBdEazyIl8hsNildd9O1TbpSPx+Yne/zzM5+n292eLID+2wA/1pvlA9JxHhEXI2Iarc/jYijneh4xO2d5209ujVfbklsb1/7OSlP6/TtvlbS3Z+KzinxSkQ8qEScf/+veZvtjdpcUeRr3fZkq7462WxvXFiuzy3lS/nK9MzlqUszM5emZg6s1jNvXz5x79u3Nje/+6p19/WxC0nMduqOnjoO0s7fpBKzPf0rh5FshJJRDwAAgKGUn/OPRMRY51NqNY50IgAAAOBlsn1sGwAAAHjpJTHqEQAAAACHa/d7ALtrew9rHewgP70ZERP98o911hBHHI9KRJzcSp5YmZDsnAbP5fadiLg/2+f6S7rX37Ob6mlbI/3Pc7+cf2b7zT/p3vwTfeafsd3fTnhOg+e/x/mPDJj/rg6Z4+vPXq0MzH8n4rWxfvmTvfzJgPzvDJn/7uYH9wYd2/4i4mzf/z/JE7n2+X2IycXlIp/aeeyb48Ef5x7uV//JQfmT/etfHbL+97Z+rQ2aS8r8507v//73y19eEx92x5FGxL3uvmxv9uQ4Xf/+m/3qXxhQ/9Pe/8+HrP+HL4/dHPKpAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0JFGxHgkabYXp2mWRZyKiP/HybRoNFvnFxvrKwvlsYiJqKSLy0U+FRHVnXZStqc78eP2xZ72TET8LyI+qp7otLP5RrEw6uIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYcyoixiNJs4hII+K3appm2ahHBQAAABy4iVEPAAAAADh07v8BAADg5ef+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgBrl65Um7bW49uzZfthRvt9VrjxoWFvFnL6uvz2XxjbTVbajSWijybb9Sf9npFo7E6fTnWb0628mZrstneuF5vrK+0ri/X55by63nlhVQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3zXe2ZI0i4i0E6dplkX8JyImopIsLhf5VET8NyIeVivHyvb0qAcNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAgWu2N2pzRZGvCQQCwV4w6pkJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBRaLY3anNFka81Rz0SAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARiv9MYmIcjtbPTPee/Ro8nu1s4+Idz+99vHNuVZrbbrs/2Wvv/VJt//iKMYPAAAA9Nq9T9+9jwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABhWs71RmyuKfO0Qg1HXCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJs/AwAA//9oSMpK") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) [ 427.461352][ T7919] loop4: detected capacity change from 0 to 2048 [ 427.500521][ T7919] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/125/file0 supports timestamps until 2038 (0x7fffffff) 04:04:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, 0x0, 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:53 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000080)={{0xc, 0x1, 0x18}, './file0\x00'}) 04:04:53 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x401012f7, 0x20000000) 04:04:53 executing program 5: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) 04:04:53 executing program 3: socket$inet6_tcp(0x2, 0xc, 0x0) 04:04:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:53 executing program 0: open(&(0x7f0000000900)='./file0\x00', 0x40, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x40, 0x0) 04:04:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @private2}}, 0x0, 0x0, 0x46, 0x0, "c89e4ddde36087de9cdd67478455cedc2c7fb67886f600e85d2cdd5014929993ac12cfbaa8aede14e2adc21040ddda2b466335413e1c253dda7e857df5a02763fc98d0d1ae8ae2d3aeb1c10c3d41849a"}, 0xd8) 04:04:53 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x1018}, './file0\x00'}) [ 427.937720][ T7931] autofs4:pid:7931:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(12.1), cmd(0xc0189372) [ 427.962751][ T7931] autofs4:pid:7931:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189372) 04:04:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x1279, 0x20000000) 04:04:53 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)="7dc1") syz_genetlink_get_family_id$devlink(&(0x7f0000000000), 0xffffffffffffffff) 04:04:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8953, 0x0) [ 428.211836][ T7926] loop4: detected capacity change from 0 to 2048 [ 428.292813][ T7926] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/126/file0 supports timestamps until 2038 (0x7fffffff) 04:04:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, 0x0, 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x20, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x894c, 0x0) 04:04:54 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) 04:04:54 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)="7dc1") syz_genetlink_get_family_id$devlink(&(0x7f0000000000), 0xffffffffffffffff) 04:04:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:54 executing program 1: socket$inet(0x2, 0x0, 0x400004) 04:04:54 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x0}) 04:04:54 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)="7dc1") syz_genetlink_get_family_id$devlink(&(0x7f0000000000), 0xffffffffffffffff) 04:04:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8929, &(0x7f0000000000)) 04:04:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8920, &(0x7f0000000000)) 04:04:54 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)="7dc1") syz_genetlink_get_family_id$devlink(&(0x7f0000000000), 0xffffffffffffffff) [ 428.988533][ T7955] loop4: detected capacity change from 0 to 2048 [ 429.088073][ T7955] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/127/file0 supports timestamps until 2038 (0x7fffffff) 04:04:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, 0x0, 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) 04:04:55 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) 04:04:55 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) 04:04:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, 0x0) 04:04:55 executing program 3: syz_clone(0x79d7fa9e781f3ba6, 0x0, 0x0, 0x0, 0x0, 0x0) 04:04:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5451, 0x0) [ 429.710119][ T7980] loop4: detected capacity change from 0 to 2048 04:04:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000013c0)=[&(0x7f00000012c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000002c0)="b362ef", 0x3}]) 04:04:55 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) 04:04:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$eJzs3M9rHGUfAPDvTLP9mffdvPAe1IMILbRQOkmaS3uLF2+FQsFrDckkhJ3NhuymdmMPrWehNggKgujdo1eh1D/AmxQ8eBdEazyIl8hsNildd9O1TbpSPx+Yne/zzM5+n292eLID+2wA/1pvlA9JxHhEXI2Iarc/jYijneh4xO2d5209ujVfbklsb1/7OSlP6/TtvlbS3Z+KzinxSkQ8qEScf/+veZvtjdpcUeRr3fZkq7462WxvXFiuzy3lS/nK9MzlqUszM5emZg6s1jNvXz5x79u3Nje/+6p19/WxC0nMduqOnjoO0s7fpBKzPf0rh5FshJJRDwAAgKGUn/OPRMRY51NqNY50IgAAAOBlsn1sGwAAAHjpJTHqEQAAAACHa/d7ALtrew9rHewgP70ZERP98o911hBHHI9KRJzcSp5YmZDsnAbP5fadiLg/2+f6S7rX37Ob6mlbI/3Pc7+cf2b7zT/p3vwTfeafsd3fTnhOg+e/x/mPDJj/rg6Z4+vPXq0MzH8n4rWxfvmTvfzJgPzvDJn/7uYH9wYd2/4i4mzf/z/JE7n2+X2IycXlIp/aeeyb48Ef5x7uV//JQfmT/etfHbL+97Z+rQ2aS8r8507v//73y19eEx92x5FGxL3uvmxv9uQ4Xf/+m/3qXxhQ/9Pe/8+HrP+HL4/dHPKpAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0JFGxHgkabYXp2mWRZyKiP/HybRoNFvnFxvrKwvlsYiJqKSLy0U+FRHVnXZStqc78eP2xZ72TET8LyI+qp7otLP5RrEw6uIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYcyoixiNJs4hII+K3appm2ahHBQAAABy4iVEPAAAAADh07v8BAADg5ef+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgBrl65Um7bW49uzZfthRvt9VrjxoWFvFnL6uvz2XxjbTVbajSWijybb9Sf9npFo7E6fTnWb0628mZrstneuF5vrK+0ri/X55by63nlhVQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3zXe2ZI0i4i0E6dplkX8JyImopIsLhf5VET8NyIeVivHyvb0qAcNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAgWu2N2pzRZGvCQQCwV4w6pkJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBRaLY3anNFka81Rz0SAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARiv9MYmIcjtbPTPee/Ro8nu1s4+Idz+99vHNuVZrbbrs/2Wvv/VJt//iKMYPAAAA9Nq9T9+9jwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABhWs71RmyuKfO0Qg1HXCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJs/AwAA//9oSMpK") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, 0x0, 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) [ 429.800867][ T7980] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/128/file0 supports timestamps until 2038 (0x7fffffff) 04:04:55 executing program 3: socket$inet6_udp(0xa, 0x3, 0x2) [ 430.070414][ T8004] loop4: detected capacity change from 0 to 2048 [ 430.086317][ T5498] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 430.150962][ T8004] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/129/file0 supports timestamps until 2038 (0x7fffffff) 04:04:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000), 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) renameat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 04:04:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 04:04:56 executing program 3: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGSID(r0, 0x80045440, 0x0) 04:04:56 executing program 1: syz_clone(0xa10000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:04:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, 0x0, 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:56 executing program 0: add_key$user(&(0x7f0000001180), &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 04:04:56 executing program 1: io_setup(0x6, &(0x7f0000000000)=0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 04:04:56 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 04:04:56 executing program 5: socketpair(0x7e, 0x0, 0x0, &(0x7f0000000400)) 04:04:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8921, &(0x7f0000000000)) 04:04:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001500)={'batadv_slave_0\x00'}) [ 430.754124][ T8012] loop4: detected capacity change from 0 to 2048 [ 430.903299][ T8012] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/130/file0 supports timestamps until 2038 (0x7fffffff) 04:04:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000), 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:57 executing program 3: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='D', 0x1, 0xfffffffffffffffe) 04:04:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000b780)={0x11, 0x7, &(0x7f000000b4c0)=@framed={{}, [@alu, @map_idx_val, @jmp]}, &(0x7f000000b540)='GPL\x00', 0x4, 0xc3, &(0x7f000000b580)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:04:57 executing program 0: syz_io_uring_setup(0x227e, &(0x7f0000000340), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0) 04:04:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, 0x0, 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) read$alg(r0, 0x0, 0x0) 04:04:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000400)='GPL\x00', 0x0, 0x3, &(0x7f0000000440)=""/3, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:04:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:04:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c000000120005ff"], 0x2c}}, 0x0) recvmmsg(r0, &(0x7f0000007700)=[{{0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f00000018c0)=""/223, 0xee}, {0x0}, {&(0x7f0000002a80)=""/4096, 0x9a2}], 0x3}}], 0x300, 0x6, 0x0) 04:04:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8902, 0x0) [ 431.442218][ T8046] loop4: detected capacity change from 0 to 2048 [ 431.488163][ T8049] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 04:04:57 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000002440), 0x0) 04:04:57 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000013c0)=[0x0]) [ 431.596448][ T8046] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/131/file0 supports timestamps until 2038 (0x7fffffff) [ 431.623597][ T8049] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.673591][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.715137][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.760348][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.773161][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.803343][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.847468][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.925695][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 431.944880][ T8058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 04:04:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000), 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:57 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000002340), 0x80000, 0x0) 04:04:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000004c0)=@newqdisc={0x24}, 0x24}}, 0x0) 04:04:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r0, 0x2000009) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:57 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b80)={&(0x7f0000000b40)='./file0\x00'}, 0x10) 04:04:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c000000120005ff"], 0x2c}}, 0x0) recvmmsg(r0, &(0x7f0000007700)=[{{0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f00000018c0)=""/223, 0xee}, {0x0}, {&(0x7f0000002a80)=""/4096, 0x9a2}], 0x3}}], 0x300, 0x6, 0x0) 04:04:58 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) 04:04:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000013c0)=[&(0x7f00000012c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000002c0)="b362efb1f6a85c50be", 0x9}]) 04:04:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5411, &(0x7f0000000000)) 04:04:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x6, 0x1, &(0x7f00000005c0)=@raw=[@kfunc], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 432.368637][ T8069] loop4: detected capacity change from 0 to 2048 04:04:58 executing program 1: io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}, 0x0) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x227e, &(0x7f0000000340)={0x0, 0x1c11, 0x40, 0x3}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000003c0), 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:04:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x4020940d, &(0x7f0000000000)) [ 432.498722][ T8069] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/132/file0 supports timestamps until 2038 (0x7fffffff) 04:04:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{0x0}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:58 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000100)) 04:04:58 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:04:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x10, 0x2, &(0x7f00000001c0)=@raw=[@initr0], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:04:58 executing program 5: io_cancel(0x0, 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) syz_io_uring_setup(0x227e, &(0x7f0000000340)={0x0, 0x0, 0x40}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 04:04:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r0, 0x2000009) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x7, 0xf3, &(0x7f0000000100)=""/243, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:04:59 executing program 0: socketpair(0x1, 0x0, 0x8, &(0x7f0000000580)) 04:04:59 executing program 3: syz_clone(0x1881200, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 04:04:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x801c581f, 0x0) 04:04:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) 04:04:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 433.323352][ T8103] loop4: detected capacity change from 0 to 2048 [ 433.391490][ T8103] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/133/file0 supports timestamps until 2038 (0x7fffffff) 04:04:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{0x0}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:04:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x0, 0x0, 0x2c0, 0xffffffff, 0xffffffff, 0x390, 0x390, 0x390, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'bond0\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "38164b937ab062a7b48df32d735c2fd9eea7ba6bcb3b3ceed7dcf2f11118"}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth0_to_batadv\x00', 'netpci0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 04:04:59 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:04:59 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0xc0402, 0x0) 04:04:59 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 04:04:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r0, 0x2000009) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2000014}) 04:04:59 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x7869fa3041a16dd, 0x0) 04:04:59 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000ec0)={{0x1, 0x1, 0xffffffffffffff79}, './file1\x00'}) 04:04:59 executing program 0: syz_clone(0x1881200, &(0x7f0000000100), 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)='0') 04:04:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xf6c5}, 0x4) 04:04:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x4, 0x278, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x210, 0x210, 0x210, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @private, 0x0, 0x0, 'wlan0\x00', 'wlan0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "3a05380b6627fab13883c134a8f24842981a6d2f294a9f436fec83636c30"}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) [ 434.076661][ T8129] loop4: detected capacity change from 0 to 2048 [ 434.128817][ T8129] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/134/file0 supports timestamps until 2038 (0x7fffffff) 04:05:00 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f000000b340)={0x0}, 0x10) [ 434.329681][ T5346] EXT4-fs unmount: 21 callbacks suppressed [ 434.329695][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:05:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{0x0}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:00 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) io_getevents(r0, 0x5, 0x0, 0x0, 0x0) 04:05:00 executing program 1: inotify_init1(0x7500a04439e5b6ab) 04:05:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, 0x0) 04:05:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8971, &(0x7f0000000000)) 04:05:00 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200001, 0x0) 04:05:00 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0}) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x3}, &(0x7f0000000100)={0x7}, &(0x7f0000000180)={r0}, 0x0) 04:05:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 04:05:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x40049409, &(0x7f0000000000)) 04:05:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x13, 0x0, 0x300) [ 435.027455][ T8153] loop4: detected capacity change from 0 to 2048 04:05:00 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x9b) 04:05:00 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 435.185983][ T8153] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 435.228030][ T8153] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/135/file0 supports timestamps until 2038 (0x7fffffff) [ 435.426197][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:05:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) 04:05:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x11, 0x13, 0x0, 0x7) 04:05:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x3, 0x0, 0x7) 04:05:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x22, 0x0, 0x0) 04:05:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, 0x0) 04:05:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x2a, 0x0, 0x0) 04:05:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x18, 0x0, 0x0) 04:05:01 executing program 5: syz_clone(0xc10e8080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)="219eff142b955ec0a2b8d41100b8ff31d0455738541793d7ccd413f993bd753f3634180fe32b293f3e612d5ae046bdc96e9917bcadca7b864cddb16fbb4497ca49c1972b2a0d25597fdb5e7c8fc9c4549a2ba443b92d1b19c393bee2017cb6438dbb639eca95e050dbac291763bf01e8c09a675632ad91726fa23be358dbeecc68dbe020f971843b2c2a5e2fd5901c2418a2d7ccdaf2d3218d21acd3052b7584abb26f9af7e6ab85c8a7b9ee46cdb6fe2bf6cfa7eeec7034a1f1d7ad6ea382f58333a7141e31ad0a226fe7bcba2bf7a8c0c0104cad2f06b70a8ae7449c72edf048") 04:05:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x11, 0x0, 0x0) [ 435.910891][ T8185] loop4: detected capacity change from 0 to 2048 04:05:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) [ 435.978218][ T8185] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 436.012596][ T8185] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/136/file0 supports timestamps until 2038 (0x7fffffff) 04:05:01 executing program 3: socket(0x1, 0x80002, 0x0) [ 436.136218][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:05:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, 0x0) 04:05:02 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:05:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x5, 0x0, 0x0) 04:05:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800000012000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b'], 0x28}}, 0x0) 04:05:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) 04:05:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x13, 0x0, 0x0) 04:05:02 executing program 3: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000080)={0x0, "c343a6821812e3f07fc14b212b11a306f6b6cf0ec356320ab4130b4b6671d16e", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r1, 0xc0383e04, &(0x7f0000000040)={"25484a8c5748e2b2cc68836a3e846ce1e2fef61a614dcb1f9ad8bf04e29b0bb0", 0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 436.869840][ T8214] loop4: detected capacity change from 0 to 2048 04:05:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_GETMDB={0x18, 0x21, 0x9}, 0x18}}, 0x0) 04:05:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x1e, 0x0, 0x0) 04:05:02 executing program 3: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0x40305828, &(0x7f00000000c0)={0x0, "d6a16bae1748f614093b2a2ee98c9f0800000063d6118eea3df400"}) 04:05:02 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_clone(0xc10e8080, 0x0, 0x0, &(0x7f0000001480), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, 0x0, 0x0) [ 437.279530][ T8214] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 437.290045][ T8214] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/137/file0 supports timestamps until 2038 (0x7fffffff) [ 437.426231][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:05:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) 04:05:03 executing program 5: r0 = socket(0xa, 0x3, 0x80) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 04:05:03 executing program 1: sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x3ed, 0x2, 0x0, 0x25dfdbfb, "ff3156fcc2c724fb810f9f7c3543d2dcd8010879e1584731a9f5875113443acf9bdf79d806463db029b32d36ce87f55b11dbc63f576afaf9068c13264365db6dae80ef8f14", [""]}, 0x58}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xe6e8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c904}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan4\x00', 0x0}) r5 = syz_clone(0xc10e8080, &(0x7f0000000480)="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", 0x1000, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)="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") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000001680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x2c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x54) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001700), r3) sendmsg$NL802154_CMD_SET_CHANNEL(r3, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x24, r6, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x11}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x19}]}, 0x24}, 0x1, 0x0, 0x0, 0x42095}, 0x4000000) sendmsg$IEEE802154_LLSEC_GETPARAMS(r3, &(0x7f00000018c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x28, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000040}, 0x20004014) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'batadv_slave_0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:05:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)) 04:05:03 executing program 3: sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xc10e8080, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) 04:05:03 executing program 5: r0 = socket(0x2, 0x3, 0x41) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8947, &(0x7f0000000300)={'batadv_slave_1\x00'}) [ 437.869472][ T8246] loop4: detected capacity change from 0 to 2048 04:05:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x16, 0x0, 0xffffffbf, 0x5, 0x0, 0x1}, 0x48) 04:05:03 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x1b, 0x0, 0x0, 0x1000000}) 04:05:03 executing program 0: syz_open_dev$MSR(&(0x7f00000001c0), 0xffffffffffffffff, 0x0) [ 438.046379][ T8246] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 438.070876][ T8246] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/138/file0 supports timestamps until 2038 (0x7fffffff) 04:05:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)) [ 438.213314][ T5346] EXT4-fs (loop4): unmounting filesystem. [ 438.491273][ T8267] loop4: detected capacity change from 0 to 2048 [ 438.552628][ T8267] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 438.563672][ T8267] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/139/file0 supports timestamps until 2038 (0x7fffffff) [ 438.642788][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:05:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0), 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:04 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x1b, 0x0, 0x0, 0x1000000}) 04:05:04 executing program 0: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00dbb60000000000"], 0x1, 0xbee, &(0x7f0000000cc0)="$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") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1000000201005) 04:05:04 executing program 1: sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x3ed, 0x2, 0x0, 0x25dfdbfb, "ff3156fcc2c724fb810f9f7c3543d2dcd8010879e1584731a9f5875113443acf9bdf79d806463db029b32d36ce87f55b11dbc63f576afaf9068c13264365db6dae80ef8f14", [""]}, 0x58}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xe6e8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c904}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan4\x00', 0x0}) r5 = syz_clone(0xc10e8080, &(0x7f0000000480)="8f884aea93bb73312a91667bab2d7e2cddaeffa357550adaaf4bfabb0801a73f49180e18d40abcaca1de0065379458c7dba201d9b03da198dd4e63db97e00b2e6deede3cce30e894dfec1bc60ac00890c34826ed9dc83e33880a9e80a0dd271c52fef19310d1e1ab07a0c55f588dc64361c6b7e04529f3093989be7f9495db18ed2bde27336360ae6980b1f84286a8a8ef14ea96b7e272f55f364b75992858c7f1f6f0f907503248679f0a852110f7cafa6f58d7051e9138b2766d2c2c9041942489f126367b552641c12df9d34b7642e9c5edba6bae57aaa5190123273d13053c10e8140b39ec42760548ccf56077f1a21a3c1b5f52a41190798e4f539723464857824b31cdccfcb4a9b6f09bd5e586acb490f763300183652b82d3f8476c922528e9959e8bb95c781c0fbf21196c614f589c0f244b60940465b2c6a2f8ff22e480d21b2053905d934870bdd466d7a58abb4aa76183f89a339bd394e5a4d4c65394bbc001b113ada00e6e897d324fd8d89db8a2458065e5a470c2cb68618ef9e5ca2d040ba2f6ccfa8e21547e2b4a1e7d023f13ef6d4d7b87b11ae7f44562d114109aad44428e96339df5c9cfb4f10e4c282bb519bd22f90b27bd2f94a6ba1eb90cd54f62e8305188b116e8ca09259fbe90439c3752659eabf80a320736a77b103e39b36fcee77146272ed73c86ccee06b238ebb20fcc454f7f04e84f0127a14947c85eead0e01ffdad07a25ba4e9d0606d8484befec75b80b8f5af529a84dbd887a76548c7986b5bd5258918768e21695d6de3297607c59eb8fd4af2ade01af0eac85e9f95db95a75e09655ef1d994fb717050e34b19419f18503903622d672ed5a6de63d5b5222c99177ec163d1b275533813160c8bc2f89bc9768a257199f0e6b58dac022d07c3a4d6fa60c1286a9be7a3dd41ac3bd41a5d6ab8358a59b80c5b3e0d43d7012d67a37724a8fcd526193bfd3775837616a1d21e96a6f6d0440d3dbb3b87fa682999d08716bc5bea1ce471ed1a7856f169db4631ab7da62113ca9cb776ff9700cf1f5cf14db8b0df9790fad4f196e2c347a8919dc7ff944dbde5f7ab403ce55834e5590525f846cc2111a11ecd7c7c0993956bda33339d380e5a5194bbff1325081caeb2c9fbc8dc6ea0c54113149f723d845df94cc72c7cca325271781d16b87dcbe785f2aa699f82352c0628b144a76c0e35ad5dfd823821eb7ebda11eaf47ceea5508ec0fe9e8d91bbecc090e65591a4dae6c10c52df6f6da5ee8d69ecf6904df085aeb90f787c0f18cf5dad80c96326c766b78f360e30ceb6d02c430d20ace1c8b1b3e1f0c2fe4745703a0913b7235c83a375dc97dc228bbd5fbffe8893016250f5b9cc9f6cfa8e1c5df01bcede00c9a5c9cf0774b54cfe61175f8bd6f22ebf8fc9bafd6c8c49f1509afa7e34c1288813944e5921b81f3a82aa719332478f7e49e5b6c7cf1a29ae510acc5fd5ede635ca38899ccb364862ee6f181b6adce9144ac53a43d583cf69e9deecb0d65b2d00127e0b9ffa244edadda78b1e1fc11b864b33435d2931b837d6a3d2488ea5b08fccfcfd4f4d10be9cafd8af0f99264a41a16d70901e652988e70027ca0e60bc887df055b8693c5c160c32415d1a6d0b5f072378587544f60544742124da59507bddd524d99701177abbaeb9570b4a23e9176dcc96accf4df7e5bbee5104a13a9e66cc41fa04c735db91a356676465d9ecfe0b9f9c19a30377bf3e8120c744c29b2ee85e5c13a8fbf8f97528c03eaf4a4b17056fcb1a0b5efb68aefb7a5f8433d4962b5d1393080d0fb5417f27ee5797a2cf95dede168419b2ea5611d9ca93b19c9033402634d35b0d8a14c34c065887734e3b945f4b6d049f71b0169d7a716a9d87657d14a5f6b06935513ed630e34d12cf2749969df3ad4e781cb0e93a543b94a027a34c92051007a29aa7909e01f416102f5c81bc1f31c8be9cb076d0325f910f44a0ba639f4acea232c028fc5ef287639a9002463026586a2d638b443e45512e9bfffb2031e81b2c6c05f28052360ee42d0fdb638f347a3b1e39cd91720b1733fd3d94ba2ede05d3bfcdd955819feffef59d30889258f1c862444cccf61ab4d3bf07f27b7910a9664ca87e175782b310cda16dd49fb814c84712b989a1d611a1ce9495c95ada05db94f208aafc65fc864a0d4dd6914f428fef5a92df11b42b46456266aa491fd702aa549a7cdc06028259ffdf932f61775b8a20921a07222d3d1d331904986b75b6d13bed9fa930ea674252e990ffe811043fcf73a7697b60a70d807b4ebd2e2ff8f9bff330b9d2858a56ef7256cba371127eea7d8e8447be4ea9bc27b7f4721037c6a81b43c956aa663998763e2309349d8ef39674295f04f57f3a9a36950b040ff53b834c6fb4908461f9193ce879cecf0ea484a840d202fbe16c5cfc222bd442ea2dc2e3dbc3bc74b48d4c09e3a7c5160b79cc4a020a0de054bdf67cd4a8653409bf5ea9c84521e85c177d37618e652d877172d777d350984597387efc1a63c371ae2df3ad8aed7f7e6531551742bfb1c9e5f6b9e59adcc8d83412151c6ce0f5d656bef8b90ea236e5d17c19adc0df0593cb1bef3f6724fae0b613889f185aec844a6f3154524932ace85d145393d414a24b9b61c37dc715b465e5e1adffad627367bddb4f0c3af685eba6ff687018860ad37a86e25672b8ca8d2445b1c93d85e5bae0d6060795f9e2f90784cc93f3c04e64229cae56de0fe34e3e7cfe8c3e95dc652479c13c2e3c4f05d88dd3d38320b0ee65d7880454b827be9b2e4cf02c5976af42969c56f2225863186c2dfada610350fdf5437cc301156ee0eb54b259f7d624762b3c997da870670436a33d12829795038cff1963cdd84747bf2f8caac1238a01d50d86c77d98110ac7a36645820d4f3fa00eb4cedaad032f60331d167f8fa33b8849c589c25618ccb47e1e35433a1313a5136dd2614ed84cf52a57372bbe01e27361f287f2ac4e8ab340b3d0a20f3dd4010765f417c732a1a7ee696f6916aae697c7b0041123023c7730f08f8cbd1646df8f7a527058ec95e00f3f82b2daa540569cf4e8ccb8aa1043a72924b7a677d4f7f83334b33cfc0daff0324ac50c3bf3cbcd98ce2062ccef3e651f907e55401c9df521e33bbcba5495ac03dc8cd0a41f2faa0d8ebba79a1566d1be029b33f42dc6ee5aa59bee702b1cee3e3291192ea4c75bedd30c999bad03e4895fd8eb6ca8af7a418efce30a9d9931a73d07ce1ae163418f9dd5b6e1742028ee5bb975b83252b70072a8e9e50d3ce387b93fafd0331b63bb397367f90d1308082311f94bed4d8247a5de804c95a16cd3423f0288ccebfa35462e78bc0fbe738f74be9d30e95a46c28acd99d4cd76cdb47752402d21819bf4d5727d0897c8eaae1b395f1d54cc22a478ec55451758e411e655e37c1effde21a13851c50643b0de45167df6847fcdc1ffd972cc32af6bf205a8f205a9294a3165e19b8a106133c456ed00a79db74994be728648be9d2e028213d6131b5b9a2018791753a9bd05b489e7504b3b01861cc65948cbefc7200f43e85624ca33de74548894f604f7b0d20e71053bbb431e29fdb65ad808ab90231f2c4e1fe679eb987dddf2cb88716cb4c7fdf633f26977a647c584421fc1104537c258b84ecea9b922db1c02512b27cdf8bc90add5769836bc4ee248e451c5620009467f6719d70ff02635847338ee7f65e9d40615cbf55df31e65c07b3f4b1e40a848af15e6d10e3012eea49c60dd133684918fcd20465adf8275ac68dad6012d9adc8a95ae91bc66cef511f9857719552078f711226da092e000aeba209ae7fa03285069f66245b49c27fd7f73534ca414d6d616b09f4e493d144d320eca933d6d97f73f65774da5d184c2cfef8dbd9f3f2a1ce29ac5fc907155ad43b8fc8877648ca0a1c8066ee98ef3590f86f054b6ea502b1cc267133781749295f529fb971aacf8f788ebec5a50833a066dbb2091746c5aaddbabded43a88575134754941989215639c76f661ef6f99a8e17f22e07bb6868f2d294f45114b472f3f695a6f01db356521646b3355da8f5cc8eb254afb75ef1ee15b65fce320d31db4e02b872404b579674b9333ba0fe9e0a41d96d7c6507af1ccf753b72a07ebd18ff88642e654c4ab30eb7fde378b82bf70d3092316e6b9c827f6379af71b9ab35668c95857b945d31b67a3cf1bac105d3db01fa6973401bab0b8fd135e70e5744d37da9ee4320857b2a564b0c635bc061cace5dc8c7afcc36209f039fb269c2bb3f1741372ab391cc0cc7734e2465be1049731aee55b11206f9a06385c4b36087b8905fdb8f0095456f3ccf4c31b84f3c9b970e8a7b24ab0311daa6ee0a931d734703d34778777a6480bb447eb9e321466e8ff2091e3dd16e9b94d4faabb4f60d8e0b31b469080ba6da17dc7ea07403ed01177db644d9688835b52218e2de32afcfbfa41890b6c690a89d933ffaea9548a79b8197d57f72ee11d8358b7fc1fab00e95569208eaf49ab762a2ec33c5916f94df142d3942a4b3367a7beb0706fe484d2d31269865dd3af27e66dd07b9ec3a1d5ceb33c6ddf01d8796ac234dc174fa85c00b7ef3649e88bcef90ff1f31d5651507e5f30740f289e0d74f73662ae86ec1dca70a907109b552e70cf3f1d1021a2dd56949c69cc5b7a615f673581008c8bfc9134c745c51792a55e925059cab96bb82d1ad48f16c9e3a54cfa19004d93ce6ce6de809ef1a0378eb37be3a3691154e20f7c6e947a127c34ac35ad98e1fb00ef5053bd3285a52d4892cc4303cac6512da7ad7b71bd432170d90f4c7c9d3558dba882886d451f646fa5a2a4b82450e61d9d6ebdd3b93804d95e13cc470fddc9c3bb50bb82bb93a5e77f72b851a4f12a23d9d12fa71dcc62eacb3b7a1a5b988053acf32e19094bafae9afd994fdd38dfaa1dce8858a54f2f0524d98ea39943b3cd5ce2b7f1d7365d6bad14d21ebcbb6d4f23c7185a3816dfef761317edc49d4ee79354a3f51f40140debbc82c9221f59f540e16762df38919cb967dac9d0768a6c35be5dd24ce7c32e306b0355ee3e3c9b932878c8f085c08fc8ad1335de07e14647114cdce6c97f5856033fc5066a40a43963598d6253ba27b8bea28fdf2d12d8f5722797a14aeef3699e7c0979e682328e45bece52e53f2380ff17891c364f572b50ad74c61446ee659c1ad17056fec9b45034c31d863d0ede964be69f58c1135204f63589f143c91149a1fe5b66c6c8e44d3488a9a55ce3372a2e07c27de1ed3f2061a0617b7de0b2a532ca493ba9f82f0140c4918c96f1c0291b8c7aca24c9eba6d9e4b1afc908391478380813cd6bd6da4abf10c853e0c45510f1c9bda4c2b84445b793d39d0a1e495f70f4cdeb303a76f8de3052a7bbccac3cf2bda6f23d07aa77c5367e6077fa89e3798d724c492f621c2ce425512de075472aa5968a3d53726ec2b18c44b99fca90208c2f585f9587855c0574d6f45f8c75de5bf2880b24e27a6a18b7722af6e7cbb2a171fa697d81ebf3f31bac3e5aaf2f8c85f5d31377558b83e5e59a8dc5e158e23277ee7c620fefc44ea9b983e87eac68654ec3e5a844ef36735504f08ab239b507e44ad09fc09970480635effebed293e96c56272c918fca3dd6edefaf8a3de8ce13ab899aaa922ef382ec46ffff21d00fa207527aa76e85d405fc4ca474d14fdd50e7c228a97a832cb679271bf56b7815c1e778bc925d0642c6bfc3538cb6b5e2e3e18e93d7fb538406be58358863bb09751188335", 0x1000, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)="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") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000001680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x2c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x54) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001700), r3) sendmsg$NL802154_CMD_SET_CHANNEL(r3, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x24, r6, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x11}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x19}]}, 0x24}, 0x1, 0x0, 0x0, 0x42095}, 0x4000000) sendmsg$IEEE802154_LLSEC_GETPARAMS(r3, &(0x7f00000018c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x28, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000040}, 0x20004014) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'batadv_slave_0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:05:04 executing program 3: sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xc10e8080, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000100)={[{@noauto_da_alloc}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@delalloc}]}, 0x1, 0x729, &(0x7f0000000800)="$eJzs3M9rHGUfAPDvTLP9mffdvPAe1IMILbRQOkmaS3uLF2+FQsFrDckkhJ3NhuymdmMPrWehNggKgujdo1eh1D/AmxQ8eBdEazyIl8hsNildd9O1TbpSPx+Yne/zzM5+n292eLID+2wA/1pvlA9JxHhEXI2Iarc/jYijneh4xO2d5209ujVfbklsb1/7OSlP6/TtvlbS3Z+KzinxSkQ8qEScf/+veZvtjdpcUeRr3fZkq7462WxvXFiuzy3lS/nK9MzlqUszM5emZg6s1jNvXz5x79u3Nje/+6p19/WxC0nMduqOnjoO0s7fpBKzPf0rh5FshJJRDwAAgKGUn/OPRMRY51NqNY50IgAAAOBlsn1sGwAAAHjpJTHqEQAAAACHa/d7ALtrew9rHewgP70ZERP98o911hBHHI9KRJzcSp5YmZDsnAbP5fadiLg/2+f6S7rX37Ob6mlbI/3Pc7+cf2b7zT/p3vwTfeafsd3fTnhOg+e/x/mPDJj/rg6Z4+vPXq0MzH8n4rWxfvmTvfzJgPzvDJn/7uYH9wYd2/4i4mzf/z/JE7n2+X2IycXlIp/aeeyb48Ef5x7uV//JQfmT/etfHbL+97Z+rQ2aS8r8507v//73y19eEx92x5FGxL3uvmxv9uQ4Xf/+m/3qXxhQ/9Pe/8+HrP+HL4/dHPKpAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0JFGxHgkabYXp2mWRZyKiP/HybRoNFvnFxvrKwvlsYiJqKSLy0U+FRHVnXZStqc78eP2xZ72TET8LyI+qp7otLP5RrEw6uIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYcyoixiNJs4hII+K3appm2ahHBQAAABy4iVEPAAAAADh07v8BAADg5ef+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgBrl65Um7bW49uzZfthRvt9VrjxoWFvFnL6uvz2XxjbTVbajSWijybb9Sf9npFo7E6fTnWb0628mZrstneuF5vrK+0ri/X55by63nlhVQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3zXe2ZI0i4i0E6dplkX8JyImopIsLhf5VET8NyIeVivHyvb0qAcNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAgWu2N2pzRZGvCQQCwV4w6pkJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBRaLY3anNFka81Rz0SAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARiv9MYmIcjtbPTPee/Ro8nu1s4+Idz+99vHNuVZrbbrs/2Wvv/VJt//iKMYPAAAA9Nq9T9+9jwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABhWs71RmyuKfO0Qg1HXCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJs/AwAA//9oSMpK") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xb) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000040)) 04:05:04 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x1b, 0x0, 0x0, 0x1000000}) [ 439.039135][ T8274] loop4: detected capacity change from 0 to 2048 [ 439.149451][ T8277] loop0: detected capacity change from 0 to 2048 [ 439.188804][ T8274] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 439.222185][ T8274] ext4 filesystem being mounted at /root/syzkaller-testdir2012978388/syzkaller.42BgCi/140/file0 supports timestamps until 2038 (0x7fffffff) 04:05:05 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x1b, 0x0, 0x0, 0x1000000}) 04:05:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001cc0)={0x0}}, 0x0) [ 439.370762][ T8277] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 439.399152][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:05:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x3c, 0x0, 0x0) 04:05:05 executing program 1: sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x3ed, 0x2, 0x0, 0x25dfdbfb, "ff3156fcc2c724fb810f9f7c3543d2dcd8010879e1584731a9f5875113443acf9bdf79d806463db029b32d36ce87f55b11dbc63f576afaf9068c13264365db6dae80ef8f14", [""]}, 0x58}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xe6e8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c904}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan4\x00', 0x0}) r5 = syz_clone(0xc10e8080, &(0x7f0000000480)="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", 0x1000, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)="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") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000001680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x2c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x54) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001700), r3) sendmsg$NL802154_CMD_SET_CHANNEL(r3, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x24, r6, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x11}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x19}]}, 0x24}, 0x1, 0x0, 0x0, 0x42095}, 0x4000000) sendmsg$IEEE802154_LLSEC_GETPARAMS(r3, &(0x7f00000018c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x28, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000040}, 0x20004014) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'batadv_slave_0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:05:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001cc0)={0x0}}, 0x0) [ 439.864028][ T1241] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.870396][ T1241] ieee802154 phy1 wpan1: encryption failed: -22 04:05:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0), 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:05 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x10, 0x4, 0x0, 0x9, 0x0, 0x1}, 0x48) 04:05:05 executing program 0: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00dbb60000000000"], 0x1, 0xbee, &(0x7f0000000cc0)="$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") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1000000201005) 04:05:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001cc0)={0x0}}, 0x0) [ 440.151511][ T8305] loop0: detected capacity change from 0 to 2048 04:05:06 executing program 3: sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xc10e8080, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:06 executing program 5: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00dbb60000000000"], 0x1, 0xbee, &(0x7f0000000cc0)="$eJzs3UFsHNd5B/DvDUmRkotk61iykxrB2gUcVWlUkootGwxQq2aJplFs1hSTtu7BK3GlbkUtFyTlyEabuCcfWqBsCvTSFChQpDB6CNhDDu0pBQr0ShS5FQXUNHVdFAX2ECOXwixm9i25kmiLMEVRkn8/QPoPZ7+3O/Peema4b8cKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACDiV371zPhEOuitAADuphfnXh6fdP4HgI+Vc37/BwAAAAAAAAAAAACAe12KIt6NFN94vJterX7uGTvbal+9Nj89s3Ozw6lqOVTVl3/GJiZPffHpZ04/288Pb3+nfTpemjt3pv7C0pXOcnNlpblQn2+3LiwtNHf9DHttf7MTVQfUr1y+unDx4kp98uSpGx6+Vntn9KFjtanTE68c7dfOT8/MzA3UDI985Fe/xQfd4XEoirgYKS6//W5qREQRe++L27x39tvhaidOVDsxPz1T7chiq9FeLR+c7XdEEVEbaPR8v4/uwljsST3izXLzyw0+Ue7eXKex3Di/2KzPNpZXW6utpfZs6m1tqsqLeDZFdCKiO3rr041EEd+MFG99p5vOR8RQvx8+X90YfPvtKfZhH3dhOCJqIxEbxX0wZvew0Sjie5Hi298ajwu5X6tueyriq2Uei7ha5vWItTI/G5HKN8gjEe/t8H7i/jIcRfxRpPjJVDct9Me+Oq6c/Vr9y+2LSwO1/ePKfX9+uJvu8WPTWBTRqI743fTRL3YAAAAAALj3FPGnkeKJHx5PnRicU2y1L9XPNc4v9j4V7n/2X8+tNjc3N2upl+M5Z3N2cq7lXM+5kbObs1bk9jlnc3ZyruVcz7mRs5uzNpTb55zN2cm5lnM950bObs7acG6fczZnJ+dazvWcGzm7wwc4XAAAAAAAAACwg8NRxNcjxVO/9Fp1X3FU96V/cur0yyd/ffCe8cdu8zxl7cmIWC92d0/uoXzr8GyaTemA7iGmd//fH+T7//7woDcGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4UEUU8WSkeO373RQpIuoRr0Yvr48e9NYBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB3wlgq4r1I8edfGat+3igifjsi3t98fzMirr+/eacd9B4DAAAAAAAAwAMoFfF6pHjy5W6qRcS12jujDx2rTZ2eeOXoUAxFKksG61+aO3em/sLSlc5yc2WluVCfb7cuLC00d/tyY2db7avX5qdn9mVnbuvwPm//4bEXljqvL7cu/e7qjo8fGTtzfmV1uXFh54fjcBQR9cE1J6oNnp+eqTZ6sdVoV01n0263GAAAAAAAAICPg5FUxPuR4q2/eXtr3nm4N+c/fHPtd78UUeTl6Tz/vDUNXX1v4BPV9wZ6y5+cOv0bk58ZXN5xyvpENaFen5+emZkbWD08cmvpWH7d8b3tMgPK8V+NFH/8l/X0RF534/gPbdV+9/e3x/vNm5/oA8Z8r+P/swPrytdMqYi/ixQ/95uPxRPVdh6JW74zkeu+Eil+a/3xXBeHyron8+MPV3+PXWwtNsfL2muR4h+v3lj7VK791HbtxK479j5Rjv+TkeJ/fmd9q2/y+OcR2B61wfH/zM3vjn0a/4cH1tXy6/78ndl1ImLl9TcuNxYXm8sWLFiwsLVw0Ecm7oby/P/1SPEPf/avW9c7+fz/M72ftq//fvrN7fP/1M1PtE/n/08NrJvKVyMjwxFjq1c6I49GjK28/sYXWlcal5qXmu1Tp597ZnL8uYnxUyOH+hd320t77qsHUTn+vxcpvvejv43P5XU3Xv/tfP1/5OYn2qfxf2Rg3ZEbrlf2vOvk8f+/SPHP0z+I43ndh13/93//P54vwreuz/dp/I8OrKt+x/tExC8MrDt+NOKB+6UMAAAA7rCUivhBnk8dv8186j9Fijf++xdzXTpW1j2fH69Vf4+9uNT+wpnFxaULjdXG+cVmfa7TuNAs2/44UnT/+vHctqjmV/vzzb053u252H+JFM/9Wr+2Nxfb/2zqke3aibL2ZKT4kxdvrO1/jnF0u3ayrP23SDHxys61x7ZrT5W1/xUpfvoX9X7tkbL2S7n20e3akxeWFhf2YVgAAAAAAGBPRlIRz0SKvz81nPqfb+/m+5+3fOi9T9//e3Rg3cJdul9lz50KAPe48vx/vDyr//Jfbc3l33j+3/7/AAye/282+O8GfNDyRzn/1+7MbgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB87KQoYilSfOPxbro+Wv7cM3a21b56bX56Zudmh1PVcqiqL/+MTUye+uLTz5x+tp8f3v5O+3S8NHfuTP2FpSud5ebKSnOhPt9uXVhaaO76Gfba/mYnqg6oX7l8deHixZX65MlTNzx8rfbO6EPHalOnJ1452q+dn56ZmRuoGR75yK9+i/QB6w9FEf8bKS6//W7699GIIvbeF7d57+y3w9VOnKh2Yn56ptqRxVajvVo+ONvviCKiNtDo+X4f3YWx2JN6xJvl5pcbfKLcvblOY7lxfrFZn20sr7ZWW0vt2dTb2lSVF/FsiuhERHf01qcbiSJGIsVb3+mmH41GDPX74fMvzr08Pnn77Sn2YR93YTgiaiMRG8V9MGb3sNEo4ulI8e1vjcd/jPb6teq2pyK+WuaxiKtlXo9YK/OzEal8gzwS8d4O7yfuL8NRxMOR4idT3fTj0Tz21XHl7NfqX25fXBqo7R9X7vvzw910jx+bxqKId6sjfjf9p/+eAQAAAAAeIEU8Fime+OHxVM0Pbs0pttqX6uca5xd7H+v3P/uv51abm5ubtdTL8ZyzOTs513Ku59zI2c1ZK3L7nLM5OznXcq7n3MjZzVkbyu1zzubs5FzLuZ5zI2c3Z204t885m7OTcy3nes6NnN3hgxwvAAAAAAAAgJ0VUcTnIsVr3++mzdHeBO+r0cvr7gd64P1/AAAA//9W5Vt6") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1000000201005) 04:05:06 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001cc0)={0x0}}, 0x0) [ 440.252269][ T8305] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 04:05:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x31, 0x0, 0x0) [ 440.331517][ T8314] loop5: detected capacity change from 0 to 2048 04:05:06 executing program 1: sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x3ed, 0x2, 0x0, 0x25dfdbfb, "ff3156fcc2c724fb810f9f7c3543d2dcd8010879e1584731a9f5875113443acf9bdf79d806463db029b32d36ce87f55b11dbc63f576afaf9068c13264365db6dae80ef8f14", [""]}, 0x58}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xe6e8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c904}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan4\x00', 0x0}) r5 = syz_clone(0xc10e8080, &(0x7f0000000480)="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", 0x1000, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)="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") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000001680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x2c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x54) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001700), r3) sendmsg$NL802154_CMD_SET_CHANNEL(r3, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x24, r6, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x11}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x19}]}, 0x24}, 0x1, 0x0, 0x0, 0x42095}, 0x4000000) sendmsg$IEEE802154_LLSEC_GETPARAMS(r3, &(0x7f00000018c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x28, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000040}, 0x20004014) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'batadv_slave_0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 440.410693][ T8314] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 04:05:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = accept(r0, &(0x7f00000004c0)=@generic, &(0x7f0000000580)=0x80) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x30) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) chdir(&(0x7f0000000180)='./file0/file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) ioctl$UI_ABS_SETUP(r7, 0x401c5504, &(0x7f0000000340)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r8 = dup(r7) write$uinput_user_dev(r8, &(0x7f0000000380)={'syz1\x00'}, 0x45c) creat(&(0x7f0000000140)='./file0\x00', 0x1a8) ioctl$UI_DEV_CREATE(r8, 0x5501) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r2) 04:05:06 executing program 0: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00dbb60000000000"], 0x1, 0xbee, &(0x7f0000000cc0)="$eJzs3UFsHNd5B/DvDUmRkotk61iykxrB2gUcVWlUkootGwxQq2aJplFs1hSTtu7BK3GlbkUtFyTlyEabuCcfWqBsCvTSFChQpDB6CNhDDu0pBQr0ShS5FQXUNHVdFAX2ECOXwixm9i25kmiLMEVRkn8/QPoPZ7+3O/Peema4b8cKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACDiV371zPhEOuitAADuphfnXh6fdP4HgI+Vc37/BwAAAAAAAAAAAACAe12KIt6NFN94vJterX7uGTvbal+9Nj89s3Ozw6lqOVTVl3/GJiZPffHpZ04/288Pb3+nfTpemjt3pv7C0pXOcnNlpblQn2+3LiwtNHf9DHttf7MTVQfUr1y+unDx4kp98uSpGx6+Vntn9KFjtanTE68c7dfOT8/MzA3UDI985Fe/xQfd4XEoirgYKS6//W5qREQRe++L27x39tvhaidOVDsxPz1T7chiq9FeLR+c7XdEEVEbaPR8v4/uwljsST3izXLzyw0+Ue7eXKex3Di/2KzPNpZXW6utpfZs6m1tqsqLeDZFdCKiO3rr041EEd+MFG99p5vOR8RQvx8+X90YfPvtKfZhH3dhOCJqIxEbxX0wZvew0Sjie5Hi298ajwu5X6tueyriq2Uei7ha5vWItTI/G5HKN8gjEe/t8H7i/jIcRfxRpPjJVDct9Me+Oq6c/Vr9y+2LSwO1/ePKfX9+uJvu8WPTWBTRqI743fTRL3YAAAAAALj3FPGnkeKJHx5PnRicU2y1L9XPNc4v9j4V7n/2X8+tNjc3N2upl+M5Z3N2cq7lXM+5kbObs1bk9jlnc3ZyruVcz7mRs5uzNpTb55zN2cm5lnM950bObs7acG6fczZnJ+dazvWcGzm7wwc4XAAAAAAAAACwg8NRxNcjxVO/9Fp1X3FU96V/cur0yyd/ffCe8cdu8zxl7cmIWC92d0/uoXzr8GyaTemA7iGmd//fH+T7//7woDcGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4UEUU8WSkeO373RQpIuoRr0Yvr48e9NYBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB3wlgq4r1I8edfGat+3igifjsi3t98fzMirr+/eacd9B4DAAAAAAAAwAMoFfF6pHjy5W6qRcS12jujDx2rTZ2eeOXoUAxFKksG61+aO3em/sLSlc5yc2WluVCfb7cuLC00d/tyY2db7avX5qdn9mVnbuvwPm//4bEXljqvL7cu/e7qjo8fGTtzfmV1uXFh54fjcBQR9cE1J6oNnp+eqTZ6sdVoV01n0263GAAAAAAAAICPg5FUxPuR4q2/eXtr3nm4N+c/fHPtd78UUeTl6Tz/vDUNXX1v4BPV9wZ6y5+cOv0bk58ZXN5xyvpENaFen5+emZkbWD08cmvpWH7d8b3tMgPK8V+NFH/8l/X0RF534/gPbdV+9/e3x/vNm5/oA8Z8r+P/swPrytdMqYi/ixQ/95uPxRPVdh6JW74zkeu+Eil+a/3xXBeHyron8+MPV3+PXWwtNsfL2muR4h+v3lj7VK791HbtxK479j5Rjv+TkeJ/fmd9q2/y+OcR2B61wfH/zM3vjn0a/4cH1tXy6/78ndl1ImLl9TcuNxYXm8sWLFiwsLVw0Ecm7oby/P/1SPEPf/avW9c7+fz/M72ftq//fvrN7fP/1M1PtE/n/08NrJvKVyMjwxFjq1c6I49GjK28/sYXWlcal5qXmu1Tp597ZnL8uYnxUyOH+hd320t77qsHUTn+vxcpvvejv43P5XU3Xv/tfP1/5OYn2qfxf2Rg3ZEbrlf2vOvk8f+/SPHP0z+I43ndh13/93//P54vwreuz/dp/I8OrKt+x/tExC8MrDt+NOKB+6UMAAAA7rCUivhBnk8dv8186j9Fijf++xdzXTpW1j2fH69Vf4+9uNT+wpnFxaULjdXG+cVmfa7TuNAs2/44UnT/+vHctqjmV/vzzb053u252H+JFM/9Wr+2Nxfb/2zqke3aibL2ZKT4kxdvrO1/jnF0u3ayrP23SDHxys61x7ZrT5W1/xUpfvoX9X7tkbL2S7n20e3akxeWFhf2YVgAAAAAAGBPRlIRz0SKvz81nPqfb+/m+5+3fOi9T9//e3Rg3cJdul9lz50KAPe48vx/vDyr//Jfbc3l33j+3/7/AAye/282+O8GfNDyRzn/1+7MbgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB87KQoYilSfOPxbro+Wv7cM3a21b56bX56Zudmh1PVcqiqL/+MTUye+uLTz5x+tp8f3v5O+3S8NHfuTP2FpSud5ebKSnOhPt9uXVhaaO76Gfba/mYnqg6oX7l8deHixZX65MlTNzx8rfbO6EPHalOnJ1452q+dn56ZmRuoGR75yK9+i/QB6w9FEf8bKS6//W7699GIIvbeF7d57+y3w9VOnKh2Yn56ptqRxVajvVo+ONvviCKiNtDo+X4f3YWx2JN6xJvl5pcbfKLcvblOY7lxfrFZn20sr7ZWW0vt2dTb2lSVF/FsiuhERHf01qcbiSJGIsVb3+mmH41GDPX74fMvzr08Pnn77Sn2YR93YTgiaiMRG8V9MGb3sNEo4ulI8e1vjcd/jPb6teq2pyK+WuaxiKtlXo9YK/OzEal8gzwS8d4O7yfuL8NRxMOR4idT3fTj0Tz21XHl7NfqX25fXBqo7R9X7vvzw910jx+bxqKId6sjfjf9p/+eAQAAAAAeIEU8Fime+OHxVM0Pbs0pttqX6uca5xd7H+v3P/uv51abm5ubtdTL8ZyzOTs513Ku59zI2c1ZK3L7nLM5OznXcq7n3MjZzVkbyu1zzubs5FzLuZ5zI2c3Z204t885m7OTcy3nes6NnN3hgxwvAAAAAAAAgJ0VUcTnIsVr3++mzdHeBO+r0cvr7gd64P1/AAAA//9W5Vt6") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1000000201005) 04:05:06 executing program 5: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00dbb60000000000"], 0x1, 0xbee, &(0x7f0000000cc0)="$eJzs3UFsHNd5B/DvDUmRkotk61iykxrB2gUcVWlUkootGwxQq2aJplFs1hSTtu7BK3GlbkUtFyTlyEabuCcfWqBsCvTSFChQpDB6CNhDDu0pBQr0ShS5FQXUNHVdFAX2ECOXwixm9i25kmiLMEVRkn8/QPoPZ7+3O/Peema4b8cKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACDiV371zPhEOuitAADuphfnXh6fdP4HgI+Vc37/BwAAAAAAAAAAAACAe12KIt6NFN94vJterX7uGTvbal+9Nj89s3Ozw6lqOVTVl3/GJiZPffHpZ04/288Pb3+nfTpemjt3pv7C0pXOcnNlpblQn2+3LiwtNHf9DHttf7MTVQfUr1y+unDx4kp98uSpGx6+Vntn9KFjtanTE68c7dfOT8/MzA3UDI985Fe/xQfd4XEoirgYKS6//W5qREQRe++L27x39tvhaidOVDsxPz1T7chiq9FeLR+c7XdEEVEbaPR8v4/uwljsST3izXLzyw0+Ue7eXKex3Di/2KzPNpZXW6utpfZs6m1tqsqLeDZFdCKiO3rr041EEd+MFG99p5vOR8RQvx8+X90YfPvtKfZhH3dhOCJqIxEbxX0wZvew0Sjie5Hi298ajwu5X6tueyriq2Uei7ha5vWItTI/G5HKN8gjEe/t8H7i/jIcRfxRpPjJVDct9Me+Oq6c/Vr9y+2LSwO1/ePKfX9+uJvu8WPTWBTRqI743fTRL3YAAAAAALj3FPGnkeKJHx5PnRicU2y1L9XPNc4v9j4V7n/2X8+tNjc3N2upl+M5Z3N2cq7lXM+5kbObs1bk9jlnc3ZyruVcz7mRs5uzNpTb55zN2cm5lnM950bObs7acG6fczZnJ+dazvWcGzm7wwc4XAAAAAAAAACwg8NRxNcjxVO/9Fp1X3FU96V/cur0yyd/ffCe8cdu8zxl7cmIWC92d0/uoXzr8GyaTemA7iGmd//fH+T7//7woDcGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4UEUU8WSkeO373RQpIuoRr0Yvr48e9NYBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB3wlgq4r1I8edfGat+3igifjsi3t98fzMirr+/eacd9B4DAAAAAAAAwAMoFfF6pHjy5W6qRcS12jujDx2rTZ2eeOXoUAxFKksG61+aO3em/sLSlc5yc2WluVCfb7cuLC00d/tyY2db7avX5qdn9mVnbuvwPm//4bEXljqvL7cu/e7qjo8fGTtzfmV1uXFh54fjcBQR9cE1J6oNnp+eqTZ6sdVoV01n0263GAAAAAAAAICPg5FUxPuR4q2/eXtr3nm4N+c/fHPtd78UUeTl6Tz/vDUNXX1v4BPV9wZ6y5+cOv0bk58ZXN5xyvpENaFen5+emZkbWD08cmvpWH7d8b3tMgPK8V+NFH/8l/X0RF534/gPbdV+9/e3x/vNm5/oA8Z8r+P/swPrytdMqYi/ixQ/95uPxRPVdh6JW74zkeu+Eil+a/3xXBeHyron8+MPV3+PXWwtNsfL2muR4h+v3lj7VK791HbtxK479j5Rjv+TkeJ/fmd9q2/y+OcR2B61wfH/zM3vjn0a/4cH1tXy6/78ndl1ImLl9TcuNxYXm8sWLFiwsLVw0Ecm7oby/P/1SPEPf/avW9c7+fz/M72ftq//fvrN7fP/1M1PtE/n/08NrJvKVyMjwxFjq1c6I49GjK28/sYXWlcal5qXmu1Tp597ZnL8uYnxUyOH+hd320t77qsHUTn+vxcpvvejv43P5XU3Xv/tfP1/5OYn2qfxf2Rg3ZEbrlf2vOvk8f+/SPHP0z+I43ndh13/93//P54vwreuz/dp/I8OrKt+x/tExC8MrDt+NOKB+6UMAAAA7rCUivhBnk8dv8186j9Fijf++xdzXTpW1j2fH69Vf4+9uNT+wpnFxaULjdXG+cVmfa7TuNAs2/44UnT/+vHctqjmV/vzzb053u252H+JFM/9Wr+2Nxfb/2zqke3aibL2ZKT4kxdvrO1/jnF0u3ayrP23SDHxys61x7ZrT5W1/xUpfvoX9X7tkbL2S7n20e3akxeWFhf2YVgAAAAAAGBPRlIRz0SKvz81nPqfb+/m+5+3fOi9T9//e3Rg3cJdul9lz50KAPe48vx/vDyr//Jfbc3l33j+3/7/AAye/282+O8GfNDyRzn/1+7MbgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB87KQoYilSfOPxbro+Wv7cM3a21b56bX56Zudmh1PVcqiqL/+MTUye+uLTz5x+tp8f3v5O+3S8NHfuTP2FpSud5ebKSnOhPt9uXVhaaO76Gfba/mYnqg6oX7l8deHixZX65MlTNzx8rfbO6EPHalOnJ1452q+dn56ZmRuoGR75yK9+i/QB6w9FEf8bKS6//W7699GIIvbeF7d57+y3w9VOnKh2Yn56ptqRxVajvVo+ONvviCKiNtDo+X4f3YWx2JN6xJvl5pcbfKLcvblOY7lxfrFZn20sr7ZWW0vt2dTb2lSVF/FsiuhERHf01qcbiSJGIsVb3+mmH41GDPX74fMvzr08Pnn77Sn2YR93YTgiaiMRG8V9MGb3sNEo4ulI8e1vjcd/jPb6teq2pyK+WuaxiKtlXo9YK/OzEal8gzwS8d4O7yfuL8NRxMOR4idT3fTj0Tz21XHl7NfqX25fXBqo7R9X7vvzw910jx+bxqKId6sjfjf9p/+eAQAAAAAeIEU8Fime+OHxVM0Pbs0pttqX6uca5xd7H+v3P/uv51abm5ubtdTL8ZyzOTs513Ku59zI2c1ZK3L7nLM5OznXcq7n3MjZzVkbyu1zzubs5FzLuZ5zI2c3Z204t885m7OTcy3nes6NnN3hgxwvAAAAAAAAgJ0VUcTnIsVr3++mzdHeBO+r0cvr7gd64P1/AAAA//9W5Vt6") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1000000201005) [ 440.952981][ T8331] input: syz1 as /devices/virtual/input/input5 [ 441.047348][ T8330] loop0: detected capacity change from 0 to 2048 [ 441.067080][ T8329] loop5: detected capacity change from 0 to 2048 [ 441.099008][ T8330] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 04:05:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0), 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 441.174764][ T8329] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 04:05:07 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setreuid(0xee01, 0xee00) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89b0, &(0x7f0000000000)={'wlan0\x00'}) 04:05:07 executing program 1: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000080)={0x0, "c343a6821812e3f07fc14b212b11a306f6b6cf0ec356320ab4130b4b6671d16e", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r1, 0xc0383e04, &(0x7f0000000040)={"25484a8c5748e2b2cc68836a3e846ce1e2fef61a614dcb1f9ad8bf04e29b0bb0", 0xffffffffffffffff, 0xffffffffffffffff, 0xa00}) 04:05:07 executing program 0: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00dbb60000000000"], 0x1, 0xbee, &(0x7f0000000cc0)="$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") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1000000201005) [ 441.719300][ T8342] loop0: detected capacity change from 0 to 2048 [ 441.778364][ T8342] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 04:05:07 executing program 3: sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xc10e8080, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:07 executing program 5: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00dbb60000000000"], 0x1, 0xbee, &(0x7f0000000cc0)="$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") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1000000201005) 04:05:07 executing program 1: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000080)={0x0, "c343a6821812e3f07fc14b212b11a306f6b6cf0ec356320ab4130b4b6671d16e", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r1, 0xc0383e04, &(0x7f0000000040)={"25484a8c5748e2b2cc68836a3e846ce1e2fef61a614dcb1f9ad8bf04e29b0bb0", 0xffffffffffffffff, 0xffffffffffffffff, 0xa00}) 04:05:07 executing program 1: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000080)={0x0, "c343a6821812e3f07fc14b212b11a306f6b6cf0ec356320ab4130b4b6671d16e", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r1, 0xc0383e04, &(0x7f0000000040)={"25484a8c5748e2b2cc68836a3e846ce1e2fef61a614dcb1f9ad8bf04e29b0bb0", 0xffffffffffffffff, 0xffffffffffffffff, 0xa00}) 04:05:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x1a, 0x0, 0x0) [ 442.145325][ T8346] loop5: detected capacity change from 0 to 2048 [ 442.171916][ T8346] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 04:05:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:05:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0xb, 0x0, 0x0) 04:05:08 executing program 5: r0 = socket(0x2, 0x3, 0x41) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89e1, &(0x7f0000000300)={'batadv_slave_1\x00'}) 04:05:08 executing program 1: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000080)={0x0, "c343a6821812e3f07fc14b212b11a306f6b6cf0ec356320ab4130b4b6671d16e", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r1, 0xc0383e04, &(0x7f0000000040)={"25484a8c5748e2b2cc68836a3e846ce1e2fef61a614dcb1f9ad8bf04e29b0bb0", 0xffffffffffffffff, 0xffffffffffffffff, 0xa00}) 04:05:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{0x0}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800000012000100"/20, @ANYRES32=r0], 0x28}}, 0x0) 04:05:08 executing program 1: bpf$MAP_CREATE(0x12, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:05:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@getlink={0x20, 0x10, 0x1}, 0x20}}, 0x0) 04:05:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_GETMDB={0x18, 0x54, 0x9}, 0x18}}, 0x0) 04:05:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x33, 0x0, 0x0) 04:05:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:05:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_GETMDB={0x18, 0x1e, 0x9}, 0x18}}, 0x0) 04:05:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x33, 0x0, 0x0) 04:05:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001200019e"], 0x28}}, 0x0) 04:05:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x19, 0x0, 0x0) 04:05:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_GETMDB={0x18, 0x1e, 0x9}, 0x18}}, 0x0) [ 443.578060][ T8386] __nla_validate_parse: 42 callbacks suppressed [ 443.578080][ T8386] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 443.728389][ T8386] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:05:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{0x0}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 04:05:09 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x6}, {0x0, 0x1ac8}, {0x3}], 0x3) 04:05:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x33, 0x0, 0x0) 04:05:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001200019e"], 0x28}}, 0x0) 04:05:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_GETMDB={0x18, 0x1e, 0x9}, 0x18}}, 0x0) 04:05:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x33, 0x0, 0x0) 04:05:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_GETMDB={0x18, 0x1e, 0x9}, 0x18}}, 0x0) 04:05:09 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 444.064915][ T8394] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 444.141059][ T8394] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:05:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x46, 0x0, 0x0) 04:05:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001200019e"], 0x28}}, 0x0) 04:05:10 executing program 5: r0 = socket(0x2, 0x3, 0x41) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000300)={'batadv_slave_1\x00'}) [ 444.393731][ T8412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 444.465921][ T8412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:05:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{0x0}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 04:05:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:05:10 executing program 4: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0x40305828, &(0x7f00000000c0)={0x10000, "d4f844f01748f614093b2a2ee90000000000000000000100"}) 04:05:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5452, &(0x7f0000000300)={'batadv_slave_1\x00'}) 04:05:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x4c, 0x0, 0x0) 04:05:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001200019e"], 0x28}}, 0x0) 04:05:10 executing program 1: r0 = socket(0x2, 0x3, 0x41) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8932, &(0x7f0000000300)={'batadv_slave_1\x00'}) 04:05:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x14}, 0x48) [ 445.068486][ T8423] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 445.108709][ T8423] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:05:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x14, 0x0, 0x4}, 0x48) 04:05:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x35, 0x0, 0x0) 04:05:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000001840)={0x14}, 0x14}}, 0x0) 04:05:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x11, 0x13, 0x0, 0x0) 04:05:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 04:05:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x35, 0x0, 0x0) 04:05:11 executing program 4: r0 = socket(0x2, 0x3, 0x41) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89e1, 0x0) 04:05:11 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000000600), 0x204083a000001f0, 0x2, 0x0) 04:05:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x6, &(0x7f0000000340)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) 04:05:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@getlink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 04:05:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x35, 0x0, 0x0) 04:05:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x10, 0x0, 0x0) 04:05:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x3a, 0x0, 0x0) 04:05:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x48) 04:05:11 executing program 1: io_setup(0x9, &(0x7f0000000000)) io_setup(0x7, &(0x7f0000000080)) io_setup(0x200, &(0x7f0000000140)) 04:05:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x35, 0x0, 0x0) 04:05:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 04:05:12 executing program 4: semget$private(0x0, 0x1040e9af5576100d, 0x0) 04:05:12 executing program 5: prctl$PR_SET_IO_FLUSHER(0x39, 0x1) io_setup(0x9, &(0x7f0000000000)) 04:05:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r1, 0x70d, 0x0, 0x0, {}, [@HEADER={0x34}]}, 0x18}}, 0x0) 04:05:12 executing program 1: io_setup(0x9, &(0x7f0000000000)) io_setup(0x7, &(0x7f0000000080)) io_setup(0x200, &(0x7f0000000140)) 04:05:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') write$P9_RRENAMEAT(r0, 0x0, 0x0) 04:05:12 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) ioprio_get$pid(0x2, 0x0) 04:05:12 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) lseek(r0, 0xfffffffffffffffc, 0x1) 04:05:12 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000040)='!selinuxsel\xad\"\x0e\xabx\xb8\xc9\xa8x\x00', 0x6e93ebbbcc0884f2, 0x1, 0x0) unshare(0x10040100) mq_notify(r0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000740)=""/57, 0x39, 0x6, &(0x7f00000007c0)={r1, r2+60000000}) add_key$user(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="bfcfdf2b98abc728d1b6a8b327029e1a11cee14fa066283336b5a0daed680b118b92a5b012e470c467c61a347c35d04d39414f0bcc054c31ce840ec9f2990d062825fbc8cf1e25b94912379f8076d5cd19dee8d29afd975fbb85c4e26a33fc4181b2bc17ba5f3f055a55fa156076468822b0e8beaa47aa8a7ef3d6260f2a2b8ab875f4e7394a0251166e956803665dbc5b57c3cfe2ad4f467ac23cd7e2eecbe423aec07da2870c", 0xa7, 0xfffffffffffffffe) mq_notify(r0, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setsig(0x11, r3, 0x0, &(0x7f0000000000)) mq_notify(r0, &(0x7f0000000000)={0x0, 0x9, 0x2, @thr={&(0x7f0000000080)="6566e57e46372bdc47003145425a98f9059dc6c331a99c651aee0090f4744424504050", &(0x7f00000000c0)="0e7ded8f9a5295934389f04309d6b431cb58d3e22ab7c36771c9328ce52e0cbf0de0c0dca90322e24999da9463de732ac856c7ed795843b7396fdb35cfbacb691776d4df844fddf03ee7d35b490c34ae59103789c803d194997519d306ede96ade22d928ad7c00994e9eddb9d5e284ce9f1777b14024c5123ffde23406d650c9e6e162a456ad92ac4b0124da17eb903e3744491942229c"}}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="00000000ff7f1a04002f66696c653000"]) clock_gettime(0x0, &(0x7f00000001c0)) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) shutdown(r4, 0x1) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000480)={r6}, &(0x7f00000004c0)=0xc) mq_notify(r4, &(0x7f0000000880)={0x0, 0x3c, 0x2, @thr={&(0x7f0000000800)="8cfb19c3de9fed1af2f3a9a906e3827e4b3853d9bafc09ca6cce96", &(0x7f0000000840)="901be5d11b994ccc18b3eece566ee23ccfbc69757fc5a395dfc990c4a0c53a9eb92ba58737697d"}}) waitid(0x2, r3, 0x0, 0x0, &(0x7f0000000480)) 04:05:12 executing program 1: io_setup(0x9, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') io_submit(r0, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r1, 0x0}]) 04:05:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 04:05:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) lseek(r0, 0xfffffffffffffffc, 0x1) 04:05:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 04:05:13 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ff3000/0xb000)=nil, 0xb000, 0x0, 0x13, r0, 0x80000000) 04:05:13 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000040)='!selinuxsel\xad\"\x0e\xabx\xb8\xc9\xa8x\x00', 0x6e93ebbbcc0884f2, 0x1, 0x0) unshare(0x10040100) mq_notify(r0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000740)=""/57, 0x39, 0x6, &(0x7f00000007c0)={r1, r2+60000000}) add_key$user(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="bfcfdf2b98abc728d1b6a8b327029e1a11cee14fa066283336b5a0daed680b118b92a5b012e470c467c61a347c35d04d39414f0bcc054c31ce840ec9f2990d062825fbc8cf1e25b94912379f8076d5cd19dee8d29afd975fbb85c4e26a33fc4181b2bc17ba5f3f055a55fa156076468822b0e8beaa47aa8a7ef3d6260f2a2b8ab875f4e7394a0251166e956803665dbc5b57c3cfe2ad4f467ac23cd7e2eecbe423aec07da2870c", 0xa7, 0xfffffffffffffffe) mq_notify(r0, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setsig(0x11, r3, 0x0, &(0x7f0000000000)) mq_notify(r0, &(0x7f0000000000)={0x0, 0x9, 0x2, @thr={&(0x7f0000000080)="6566e57e46372bdc47003145425a98f9059dc6c331a99c651aee0090f4744424504050", &(0x7f00000000c0)="0e7ded8f9a5295934389f04309d6b431cb58d3e22ab7c36771c9328ce52e0cbf0de0c0dca90322e24999da9463de732ac856c7ed795843b7396fdb35cfbacb691776d4df844fddf03ee7d35b490c34ae59103789c803d194997519d306ede96ade22d928ad7c00994e9eddb9d5e284ce9f1777b14024c5123ffde23406d650c9e6e162a456ad92ac4b0124da17eb903e3744491942229c"}}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000540)=ANY=[@ANYBLOB="0100000101000054fcb6270046da73e1b53c035fc15b12bf3995b7592720067fcc5fbedd249652f91ecf2ac2ee7cca30ffe237a13c2295766aec5e5ea366e83d4104d7a3adcb81abd131cd5773d237c5380b32c1e31634efaf3c5716d6d27a3223d4ce928f94ef7467dddc93b4046afb44dc5701fc63879f8c040214c509b3aeb75c08bd3388664f2ae2a966985100ccf87ba93b1064bfb1dd709272f570b6f9dda5d02dfc18ba9d09c005e8996ceeb7364066a9d674203110563071a0db9c38cfec86b99784726311f571ea3cf8a6678923e3a86964e244dd9bc8942d8217a590d510f419f53477c9ff90afbeab3dd5f210654e41128098f4a95685a85e39b34a704b5663d05275c36c5bee330faa1785d7c340c8d20febeae5ec9e18b8c25dea5b578569b9cdbeafa67a4c5f38df36df5e6d73670315e72760d6ca3a30f29fc02b6369e812466b8f1c800312b8e1753502eb3f55eed2aadf16bdad8b468a", @ANYRES32=r0, @ANYBLOB="00000000ff7f1a04002f66696c653000"]) clock_gettime(0x0, &(0x7f00000001c0)) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) shutdown(r4, 0x1) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000480)={r6}, &(0x7f00000004c0)=0xc) mq_notify(r4, &(0x7f0000000880)={0x0, 0x3c, 0x2, @thr={&(0x7f0000000800)="8cfb19c3de9fed1af2f3a9a906e3827e4b3853d9bafc09ca6cce96", &(0x7f0000000840)="901be5d11b994ccc18b3eece566ee23ccfbc69757fc5a395dfc990c4a0c53a9eb92ba58737697d"}}) waitid(0x2, r3, 0x0, 0x0, &(0x7f0000000480)) 04:05:13 executing program 3: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000040)='!selinuxsel\xad\"\x0e\xabx\xb8\xc9\xa8x\x00', 0x6e93ebbbcc0884f2, 0x1, 0x0) unshare(0x10040100) mq_notify(r0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000740)=""/57, 0x39, 0x6, &(0x7f00000007c0)={r1, r2+60000000}) add_key$user(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="bfcfdf2b98abc728d1b6a8b327029e1a11cee14fa066283336b5a0daed680b118b92a5b012e470c467c61a347c35d04d39414f0bcc054c31ce840ec9f2990d062825fbc8cf1e25b94912379f8076d5cd19dee8d29afd975fbb85c4e26a33fc4181b2bc17ba5f3f055a55fa156076468822b0e8beaa47aa8a7ef3d6260f2a2b8ab875f4e7394a0251166e956803665dbc5b57c3cfe2ad4f467ac23cd7e2eecbe423aec07da2870c", 0xa7, 0xfffffffffffffffe) mq_notify(r0, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setsig(0x11, r3, 0x0, &(0x7f0000000000)) mq_notify(r0, &(0x7f0000000000)={0x0, 0x9, 0x2, @thr={&(0x7f0000000080)="6566e57e46372bdc47003145425a98f9059dc6c331a99c651aee0090f4744424504050", &(0x7f00000000c0)="0e7ded8f9a5295934389f04309d6b431cb58d3e22ab7c36771c9328ce52e0cbf0de0c0dca90322e24999da9463de732ac856c7ed795843b7396fdb35cfbacb691776d4df844fddf03ee7d35b490c34ae59103789c803d194997519d306ede96ade22d928ad7c00994e9eddb9d5e284ce9f1777b14024c5123ffde23406d650c9e6e162a456ad92ac4b0124da17eb903e3744491942229c"}}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="00000000ff7f1a04002f66696c653000"]) clock_gettime(0x0, &(0x7f00000001c0)) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) shutdown(r4, 0x1) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000480)={r6}, &(0x7f00000004c0)=0xc) mq_notify(r4, &(0x7f0000000880)={0x0, 0x3c, 0x2, @thr={&(0x7f0000000800)="8cfb19c3de9fed1af2f3a9a906e3827e4b3853d9bafc09ca6cce96", &(0x7f0000000840)="901be5d11b994ccc18b3eece566ee23ccfbc69757fc5a395dfc990c4a0c53a9eb92ba58737697d"}}) waitid(0x2, r3, 0x0, 0x0, &(0x7f0000000480)) 04:05:13 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000040)='!selinuxsel\xad\"\x0e\xabx\xb8\xc9\xa8x\x00', 0x6e93ebbbcc0884f2, 0x1, 0x0) unshare(0x10040100) mq_notify(r0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000740)=""/57, 0x39, 0x6, &(0x7f00000007c0)={r1, r2+60000000}) add_key$user(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="bfcfdf2b98abc728d1b6a8b327029e1a11cee14fa066283336b5a0daed680b118b92a5b012e470c467c61a347c35d04d39414f0bcc054c31ce840ec9f2990d062825fbc8cf1e25b94912379f8076d5cd19dee8d29afd975fbb85c4e26a33fc4181b2bc17ba5f3f055a55fa156076468822b0e8beaa47aa8a7ef3d6260f2a2b8ab875f4e7394a0251166e956803665dbc5b57c3cfe2ad4f467ac23cd7e2eecbe423aec07da2870c", 0xa7, 0xfffffffffffffffe) mq_notify(r0, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setsig(0x11, r3, 0x0, &(0x7f0000000000)) mq_notify(r0, &(0x7f0000000000)={0x0, 0x9, 0x2, @thr={&(0x7f0000000080)="6566e57e46372bdc47003145425a98f9059dc6c331a99c651aee0090f4744424504050", &(0x7f00000000c0)="0e7ded8f9a5295934389f04309d6b431cb58d3e22ab7c36771c9328ce52e0cbf0de0c0dca90322e24999da9463de732ac856c7ed795843b7396fdb35cfbacb691776d4df844fddf03ee7d35b490c34ae59103789c803d194997519d306ede96ade22d928ad7c00994e9eddb9d5e284ce9f1777b14024c5123ffde23406d650c9e6e162a456ad92ac4b0124da17eb903e3744491942229c"}}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="00000000ff7f1a04002f66696c653000"]) clock_gettime(0x0, &(0x7f00000001c0)) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) shutdown(r4, 0x1) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000480)={r6}, &(0x7f00000004c0)=0xc) mq_notify(r4, &(0x7f0000000880)={0x0, 0x3c, 0x2, @thr={&(0x7f0000000800)="8cfb19c3de9fed1af2f3a9a906e3827e4b3853d9bafc09ca6cce96", &(0x7f0000000840)="901be5d11b994ccc18b3eece566ee23ccfbc69757fc5a395dfc990c4a0c53a9eb92ba58737697d"}}) waitid(0x2, r3, 0x0, 0x0, &(0x7f0000000480)) 04:05:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) lseek(r0, 0xfffffffffffffffc, 0x1) 04:05:14 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) lseek(r0, 0xfffffffffffffffc, 0x1) 04:05:14 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='\x00\xc1\xf9\xe7\x92\xc2\xe8\x82\x8e\t\x92\x84\x13\x11^h\x9a*\x0f]\x9d\xa7Z\xf8\xc1\x9cW\n\xa5\xbd\'f\x13\xc8\x8d\xc8\x9d|\x86\x99+\xfa\xef\x7f\xe9\xb2pP\xb88\xec\x84\x18\xa3\xa5^*\xc5.\xbc\xd4\x00&YY*\xa0,\x80\xef\x9e\xd7sY\x1b\x9c\b\x9b\x89\x82\x9dcup\xe9S\xfcl\x88y\x8bJ\a\xc6\xe3K\x1a(\x9a\x7fXP\xdd\x1a\xae\b<\xc0\xee\xf8\x11\xd1<,T?\x80-\x9f\xc0[<\xe3(\xd1\xb7}\xa1:\x95m\xcf\x83t\xaa\xaa\x80\x06_\xb0\x81\xee\xdfa\xcd#\xaf\xb5=\xa1\x80\xbc\x89X\xd2\x1et\xee\x99A}\xf8\x1dN\xc6\xb1\x87\xd7\xb7\xfa\x94zt\xe9eI\xac[\xad\\b\x13\x9e\x7f\x01\xfd\xd4\x03\x82\x00\x1c\xe8^\xbe\xa5\xd3\x83\x19T)\xbf\xc1\vC\xd6[0xffffffffffffffff}) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 04:05:15 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x8008, &(0x7f0000000000)=0x2ffffff, 0x18) 04:05:15 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:15 executing program 3: r0 = socket(0x11, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 04:05:15 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 04:05:15 executing program 5: ppoll(&(0x7f0000004600)=[{}], 0x1, &(0x7f0000004640), &(0x7f0000004680), 0x10) 04:05:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 04:05:15 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:15 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x1c, 0x1c, 0x3}, 0x1c) sendto(r0, &(0x7f0000000280)="15", 0x1, 0x100, 0x0, 0x0) 04:05:15 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:15 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0xb) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0xb) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 04:05:15 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x3, 0x4) 04:05:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000140)={0x0, 0x1110}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000b80)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000800)='\f', 0x1}], 0x1, &(0x7f0000000d80)=ANY=[@ANYBLOB="140000008400000007"], 0x74}, 0x0) 04:05:15 executing program 4: unlink(&(0x7f0000000040)='\x00') 04:05:15 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:15 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 04:05:15 executing program 1: r0 = socket(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000002c0)={0x4, {{0x1c, 0x1c}}, {{0x1c, 0x1c, 0x3}}}, 0x108) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 04:05:15 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 04:05:15 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:15 executing program 4: r0 = socket(0x1, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) 04:05:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000040), &(0x7f0000000080)=0x8) 04:05:15 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x43, &(0x7f00000000c0), 0x4) 04:05:15 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:15 executing program 5: open$dir(&(0x7f0000000100)='./file0\x00', 0x200a42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) 04:05:15 executing program 1: getsockname$inet(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x200a42, 0x0) 04:05:15 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:16 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 04:05:16 executing program 5: ppoll(0x0, 0x0, &(0x7f0000004800)={0x0, 0x7}, 0x0, 0x0) 04:05:16 executing program 4: r0 = socket(0x1c, 0x3, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 04:05:16 executing program 1: r0 = socket(0x1c, 0x3, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000100)=0xfffffffffffffefa) 04:05:16 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 04:05:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000080)="dc", 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="2c00000084"], 0x2c}, 0x0) 04:05:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 04:05:16 executing program 3: ppoll(0x0, 0x0, &(0x7f0000004640)={0x5}, 0x0, 0x0) 04:05:16 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000100)={@ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}}, 0x14) 04:05:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 04:05:16 executing program 4: r0 = socket(0x2, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 04:05:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x10, 0x2}, 0x10) 04:05:16 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c}, 0x1c) 04:05:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 04:05:16 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f00000000c0), &(0x7f0000000100)=0x8) [ 450.848231][ T8640] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 04:05:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000140)={0x0, 0x1110}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000b80)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="140000008400000007"], 0x74}, 0x0) 04:05:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000080)="dc", 0x1}, {&(0x7f0000000680)="c241939be21671f27c22a30b68ab69b43d85115404d358cc8231356913d8d24132d998184ec15bdddcd1c0cab1a14c8e35caa73f7873156e760d97db00c2f58edd81ba3b28041a7137250f94e28733e88c58b4f396a632fcff6b3e6bdb51b5ed0bbf0c40387b213b8ccce8bcee00862ef822fd559537b8b0244161b623c731a24ca5320bd324d458f7aa5581e0f04eb7f54828eb76d3956f10cd56bf950cb1f4", 0xa0}, {&(0x7f0000000740)="7f12f1ba3bb48fbab935c7c606bdf183a0f3d5259ae8d8012be7e85b510f28bf4f1d37de0a2c256cddcf28d1b9ac63c846dae1f0167bad4c5550fbf9c1449ca15bab6c0ef5c8fba9355071a7381eaa", 0x4f}, {&(0x7f00000007c0)="e353802a62dc8805690dba028b232aa992a0866d468a46eebf6e87781d260f1f0fb5f3246bbfb9a9459d495de07a6dd0e3437c942f9f68f51c7ff2532609174544b739b8b4d913e0f789a1f4a40320041cd0a0e828a2c5c440b7a984691801e94e2efd1d3dadce8c1090a5683d2a9602680fa325e3b80a29f4f5a7a508300619d7a38fbedc7e8a892e9df22cec8302f4f046ef0f978947c7210072433c970745b7f18d1d61c8b3cc09e0c8a0746259dcb7018fbec260944657d30424f52fcc01d96d2f03579e", 0xc6}, {&(0x7f0000001480)="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", 0xe3b}], 0x5, 0x0, 0x2c}, 0x0) 04:05:16 executing program 2: socket(0x1b, 0x3, 0x3) 04:05:16 executing program 1: getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@local, @multicast2}, 0x0) 04:05:17 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) 04:05:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100), &(0x7f0000000000)=0x4) 04:05:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000080)="dc", 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB=','], 0x2c}, 0x0) 04:05:17 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)='`', 0x1, 0x0, &(0x7f0000000380)={0x1c, 0x1c}, 0x1c) 04:05:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_buf(r0, 0x0, 0x52, 0x0, 0x0) 04:05:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x2c}, 0x0) 04:05:17 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 04:05:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={&(0x7f0000000400)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000014c0)=[@sndinfo={0x1c}, @prinfo={0x14}], 0x30}, 0x0) 04:05:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000180), &(0x7f0000000280)=0xb0) 04:05:17 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x1c, 0x1c}, 0x1c) 04:05:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000040)={0x10, 0x2}, 0x10) dup2(r1, r2) 04:05:17 executing program 5: r0 = socket(0x11, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="e255a2fa35dc98b9", 0x8, 0x0, 0x0, 0x0) 04:05:18 executing program 3: r0 = socket(0x1c, 0x5, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000100)) 04:05:18 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup(r0) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) 04:05:18 executing program 1: open$dir(&(0x7f0000000100)='./file0\x00', 0x200a42, 0x0) link(&(0x7f0000000400)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) 04:05:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={&(0x7f0000000400)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000014c0)=[@prinfo={0x14}], 0x14}, 0x0) 04:05:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000006c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000002480), &(0x7f00000025c0)=0x14) 04:05:18 executing program 1: r0 = socket(0x1, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000000)=0xffffffff, 0x4) 04:05:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) 04:05:18 executing program 5: r0 = socket(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 04:05:18 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000280)='`', 0x1, 0x0, &(0x7f0000000380)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='J', 0x1, 0x183, 0x0, 0x0) 04:05:18 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/156, 0x9c}, 0x82) 04:05:18 executing program 0: socketpair(0x11, 0x3, 0x2, 0x0) 04:05:18 executing program 4: open$dir(&(0x7f0000000100)='./file1\x00', 0x200a42, 0x0) link(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000300)='./file0\x00') 04:05:18 executing program 3: r0 = socket(0x1c, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 04:05:18 executing program 0: r0 = socket(0x1, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) 04:05:18 executing program 2: open$dir(&(0x7f0000000000)='\x00', 0x2000000, 0x0) 04:05:18 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x14c, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 04:05:18 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200a42, 0x0) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x200a00, 0x0) 04:05:18 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000280)='`', 0x1, 0x88, &(0x7f0000000380)={0x1c, 0x1c}, 0x1c) 04:05:18 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000040)=@un=@abs={0x8}, 0x8) 04:05:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000180)={r4}, &(0x7f00000001c0)=0x18) 04:05:19 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000240)={0x2, [0x0, 0x0]}, &(0x7f0000000280)=0x8) 04:05:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 04:05:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000180), &(0x7f00000001c0)=0x18) 04:05:19 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 04:05:19 executing program 1: r0 = socket(0x1c, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 04:05:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000002680)='./file0\x00', 0x0, 0x0) 04:05:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c) 04:05:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={&(0x7f0000000400)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000014c0)=[@sndinfo={0x1c}], 0x1c}, 0x0) 04:05:19 executing program 0: open$dir(&(0x7f0000000100)='./file0\x00', 0x200a00, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x40300, 0x0) 04:05:19 executing program 5: open$dir(&(0x7f0000000100)='./file0\x00', 0x200a42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 04:05:19 executing program 4: r0 = socket(0x2, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 04:05:19 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:19 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000700)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0x100, &(0x7f0000000240)={r2}, &(0x7f00000000c0)=0xb0) 04:05:19 executing program 4: open$dir(&(0x7f0000000080)='./file0\x00', 0x40300, 0x0) 04:05:19 executing program 5: r0 = socket(0x2, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 04:05:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000002c0)={0x0, 0x800}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xffffff6c) 04:05:19 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000", @ANYRES32=0x0], &(0x7f0000000200)=0xb) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000180)={r3, 0x6}, 0x8) 04:05:19 executing program 0: r0 = socket(0x1c, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 04:05:19 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 04:05:19 executing program 5: r0 = socket(0x1c, 0x3, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x66, 0x0, 0x0) 04:05:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xffffffffffffffd3, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000300)="088fee04", 0x4}], 0x1}, 0x0) 04:05:20 executing program 1: open$dir(&(0x7f0000000100)='./file0\x00', 0x200a42, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffff9c, 0x0, 0x0) 04:05:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 04:05:20 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000280)='`', 0x1, 0x0, &(0x7f0000000380)={0x1c, 0x1c}, 0x1c) 04:05:20 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000003c0)="80", 0x1, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x1c, 0x1c}, 0x1c) 04:05:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 04:05:20 executing program 5: open$dir(&(0x7f00000000c0)='\x00', 0x200, 0x0) 04:05:20 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x3, 0x4, 0x4, 0xe1f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000000c0)}, 0x20) 04:05:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 04:05:20 executing program 5: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) 04:05:20 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000002380)={0x0, 0x0, 0x0}, 0x40080) 04:05:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB=','], 0x2c}, 0x0) 04:05:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x7400}]}}, &(0x7f00000003c0)=""/158, 0x2a, 0x9e, 0x1}, 0x20) 04:05:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbda}, [@alu={0x7, 0x1, 0xc}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xdf, &(0x7f0000000300)=""/223, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:20 executing program 5: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000fc0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 04:05:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000001540)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 04:05:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000200)=""/146, 0x26, 0x92, 0x1}, 0x20) 04:05:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xff6c, [@union]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001540)=""/4096, 0xff90, 0x1000, 0x81}, 0x20) 04:05:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) 04:05:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10}]}}, &(0x7f0000001540)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 04:05:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[], &(0x7f0000001540)=""/4096, 0xff90, 0x1000, 0x81}, 0x20) 04:05:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000400)=@framed={{}, [@map_val, @generic]}, &(0x7f0000000340)='syzkaller\x00', 0x400, 0xb8, &(0x7f0000000580)=""/200, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880), 0x8, 0x10, &(0x7f00000008c0), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x1d) 04:05:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000001540)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) 04:05:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f00000002c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 04:05:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002040)={&(0x7f0000000980)=@xdp, 0x80, &(0x7f0000001f40), 0x2, 0x0, 0xffffffffffffffa8}, 0x0) 04:05:21 executing program 1: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 04:05:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x12}, 0x48) 04:05:21 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001000), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001600)) 04:05:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x3, &(0x7f00000009c0)=@framed, &(0x7f0000000a40)='GPL\x00', 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b00), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff]}, 0x80) recvmsg(0xffffffffffffffff, 0x0, 0x0) 04:05:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, 0x0) 04:05:21 executing program 0: syz_clone(0x40000700, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:21 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x3, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000a40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:21 executing program 5: syz_clone(0x20001400, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 04:05:21 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 04:05:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x3, &(0x7f00000009c0)=@framed, &(0x7f0000000a40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:05:22 executing program 5: syz_clone(0x20001400, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:22 executing program 1: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:22 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001600)) 04:05:22 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='.\x00'}, 0x10) 04:05:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0xc5c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x48) 04:05:22 executing program 2: socketpair(0x2, 0xa, 0x2000, &(0x7f0000000040)) 04:05:22 executing program 4: socketpair(0x2, 0x80001, 0x0, &(0x7f0000000000)) 04:05:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x7, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_val, @cb_func], &(0x7f0000000080)='GPL\x00', 0x5, 0xc1, &(0x7f0000000100)=""/193, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 04:05:22 executing program 5: syz_clone(0x20001400, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x2, 0xdf, &(0x7f0000000300)=""/223, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xcc) 04:05:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000180)=""/151, 0x32, 0x97, 0x1}, 0x20) 04:05:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x12, 0x40, 0x0, 0x1ff}, 0x48) [ 456.674099][ T8924] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 04:05:22 executing program 1: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:22 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 04:05:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bond_slave_0\x00'}) 04:05:22 executing program 5: syz_clone(0x20001400, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:22 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0) 04:05:22 executing program 3: socketpair(0x2, 0xa, 0x300, &(0x7f0000000040)) 04:05:22 executing program 2: socketpair(0x10, 0x3, 0x0, &(0x7f00000000c0)) 04:05:22 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x7, 0x32, 0x0, 0x0) 04:05:22 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x3, &(0x7f00000009c0)=@framed, &(0x7f0000000a40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b00), 0x8, 0x10, 0x0}, 0x80) 04:05:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x3, &(0x7f00000009c0)=@framed, &(0x7f0000000a40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:05:22 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x121400, 0x0) 04:05:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85ffffffaa000000070000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xdf, &(0x7f0000000300)=""/223, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:23 executing program 1: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="44000000000000000000000007000079ffffffffac1414aa00000000ac1414bbac1414bbac141424e0000002ac1e0001ac1414bb0707620a01010000000000000014000000000000000019"], 0xb0}, 0x0) 04:05:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 04:05:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=ANY=[], 0xb0}, 0x0) 04:05:23 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) 04:05:23 executing program 2: socketpair(0x1, 0x0, 0x400, &(0x7f0000000000)) 04:05:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x0, 0x0, 0x0, 0x0, 0x419, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) 04:05:23 executing program 0: socketpair(0x2, 0x5, 0x400, &(0x7f0000000000)) 04:05:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004100)={0x6, 0x9, &(0x7f0000003c40)=@raw=[@btf_id, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f0000003cc0)='syzkaller\x00', 0x6, 0xcb, &(0x7f0000003e40)=""/203, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x58}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xdf, &(0x7f0000000300)=""/223, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002580)={&(0x7f0000002480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000024c0)=""/168, 0x1a, 0xa8, 0x1}, 0x20) 04:05:23 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x480201, 0x0) 04:05:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000035c0)=@base={0x19, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 04:05:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x14, 0x2, &(0x7f00000002c0)=@raw=[@map_idx], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 04:05:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 04:05:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001bc0)={&(0x7f0000001640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, 0x0}, 0x0) 04:05:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000cc0)={&(0x7f0000000500), 0x10, &(0x7f0000000c00)=[{&(0x7f0000000540)="b3", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x803e}, 0x0) 04:05:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) 04:05:23 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x5450, 0x0) 04:05:23 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) fsync(r0) 04:05:23 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x101001, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) 04:05:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0xfffffd0e) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x45) listen(r1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'btrfs.', '\x00'}, &(0x7f0000000180)='](&/\x00', 0x5, 0x3) r2 = accept$inet6(r1, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r1, 0x0, 0x0, 0x800) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, 0x0, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8912, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x5451, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x5451, 0x0) 04:05:23 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000013c0)={&(0x7f0000000040)=@id, 0x10, 0x0}, 0x0) 04:05:23 executing program 0: syz_clone(0x200a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:23 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000001180)='ns/mnt\x00') 04:05:23 executing program 2: bpf$BPF_PROG_DETACH(0x4, &(0x7f0000000f40)={@map}, 0x10) [ 458.156969][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:05:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x20040041) 04:05:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8, 0x876c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 04:05:24 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_clone(0x200a0000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 04:05:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000140)=""/145, 0x3a, 0x91, 0x1}, 0x20) 04:05:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40) 04:05:24 executing program 5: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'wlan1\x00', 0x1}) 04:05:24 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000f40)={@map, 0xffffffffffffffff, 0x13}, 0x10) 04:05:24 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@map, 0xffffffffffffffff, 0x16}, 0x10) 04:05:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000cc0)={&(0x7f0000000500), 0x20000510, 0x0}, 0x0) 04:05:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000004c0)={&(0x7f0000000080), 0x10, &(0x7f0000000680)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 04:05:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 04:05:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 04:05:24 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'wlan1\x00', 0x1}) 04:05:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1b, 0x1, &(0x7f0000000100)=@raw=[@kfunc], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 04:05:24 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/64, 0x40}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)='n', 0x1}], 0x1, 0x0, 0x0, 0x8000}, 0x0) 04:05:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000e40)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 04:05:24 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/61, 0x3d}, {&(0x7f0000001e40)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)="3f064072f43932161ad69cc855de3ff460691287f40276ef407422e0cd1a6e7da0c46ac59d1b8e34e6f04e8f06474e542589e8aeb8b62cfea57e98a7e2a6", 0x3e}], 0x1}, 0x0) 04:05:24 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/64, 0x40}], 0x1}, 0x0) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)='n', 0x1}], 0x1}, 0x0) 04:05:24 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b40)={0xffffffffffffffff, 0x0, 0x9d, 0x5c, &(0x7f0000002040)="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", &(0x7f0000000980)=""/92, 0x0, 0x0, 0x1000, 0x4c, &(0x7f0000000ac0)="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", &(0x7f0000001ac0)="95abb91635a5541bd9c1e90ec7709d2e7317f7556b487a6642e411f20802b439d0f953de543c2cbdf08e44c1cf75067b47bf3b2a2b505f137e4c6f66c737c96906a8e61a2f98a6fb52c13bba", 0x0, 0x7}, 0x31) 04:05:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x8, 0x4, 0x4, 0xd86}, 0x48) 04:05:25 executing program 1: open$dir(&(0x7f0000000100)='./file0\x00', 0x490000, 0x0) 04:05:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000340)={0x0, 0x0}) 04:05:25 executing program 4: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0xca1779c17c6eff5) 04:05:25 executing program 5: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 04:05:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x8, 0x0, 0x4, 0xd86, 0x4}, 0x48) 04:05:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000e40)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 04:05:25 executing program 5: open$dir(&(0x7f0000000240)='./file0\x00', 0x84040, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:05:25 executing program 4: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0xfffffffffffff000}, &(0x7f0000000180)={0x0, r0+60000000}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 04:05:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x408, 0x0, 0x110, 0x220, 0x320, 0x320, 0x320, 0x4, 0x0, {[{{@arp={@local, @private, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan0\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @remote, @private}}}, {{@arp={@private, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macsec0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@remote, @multicast1, @local}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x458) 04:05:25 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000200)=[{}], 0x1, 0x0) 04:05:25 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff}) getdents64(r0, &(0x7f00000005c0)=""/205, 0xcd) 04:05:25 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 04:05:25 executing program 3: io_setup(0x6, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) [ 459.563860][ T27] audit: type=1800 audit(1669262725.361:16): pid=9084 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=1172 res=0 errno=0 04:05:25 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x4}], 0x1, &(0x7f0000000240)) 04:05:25 executing program 5: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 04:05:25 executing program 1: getpgrp(0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_delete(0x0) 04:05:25 executing program 5: pselect6(0x40, &(0x7f0000000580), &(0x7f00000005c0)={0x5}, &(0x7f0000000600)={0x5}, 0x0, 0x0) 04:05:25 executing program 4: syz_clone(0x13846100, &(0x7f0000000000)="f4e60145b7628c5ee2f20dc26e2ed437e44f74cbc052bdb21f4ddf0461d9015fe5b33fb705318de8538c3b6dab0a7cc0cf46", 0x32, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="772cb204f36e655e4225c91f5ef8aa50608651929f7e4fcbe23df2961f74511f621edf879c2b37d7980d4764d62ad99c12e7254fc5276d7c207a31a7e30f3693d2b1441f77c57c7736829f2ec9301baf64d964698b941b4045db655f1d241271") [ 459.734890][ T9096] x_tables: duplicate underflow at hook 1 04:05:25 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) timerfd_settime(r0, 0x0, 0x0, 0x0) 04:05:25 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/net', 0x519000, 0x0) 04:05:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x408, 0x0, 0x110, 0x220, 0x320, 0x320, 0x320, 0x4, 0x0, {[{{@arp={@local, @private, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan0\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @remote, @private}}}, {{@arp={@private, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macsec0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@remote, @multicast1, @local}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x458) 04:05:25 executing program 0: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x0) 04:05:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000040)=[{}]}) 04:05:25 executing program 3: mq_open(&(0x7f0000000200)='+/.\x84:\x8c\xfb\x8c\xa5#x|\x94\xe2\xe0\xb1?j\x19\xa5#~\x97g\x9al@\xdb\\\xa0\x0e\"\xd6\n\xac{\xc4vW\xc9\ag\x8dU\x99\b\xb4\xa7\xd0\xb9\xd1\xd6\xe3\xbd\xc71\xd1\x00\xb5\xec\x82\x849\x8b6\xd0\x92\xf8_C\x97)\x1d\x04\x93\xe1\xca\x9c\xc7\xd2d\x8f)+=@\xff\x15?\xa5\x1f\xab\xc3\x12\xdb\xeeH*Sz uX\xd9\xdfyg\xca~\x13\xdf\xff\xb1\xf1r\xc2[\xa2\xc2\x95\xb5\xb3K\xc0\x80\xc9x\xac\x98\xf8=\"\xde\x1b\xaf\x1eH\x92\x81\xc1j\x9e\xe1\xb2\xad\x1e=_\v\x95\x05\xb4\x9b0\xac\x81/\xd7\xffj\xba\xe8]\xdb\b\xbb\xbf\x1b\xb3\xbf\xaa\xc5\xb1\xcb_\nK\xa3:\xcf\xe2\xdbu+n9AP\xb8_\xc5\xcb\x15})\xae\x06\xe4\x99D\xee\xd8\xd8\'%/H\x81D\xdb\x8e\f\xdaK\x94\xdau\xb3?&b\xfe\x88\xc2\xf2\x96\xe0rJW\xd8\xbf\xca\x95\xcb\x95\xdc\xee\xb1\xf5\x9e\xf8DI4\x10^\xb0e\xf5k,\x97\x0e\xf6\x84\xed\x05\x9d\x03\x92H\xbe/\x83\xaf\x19+f\x169\xb3\x8e$\xa2\x9a\xca\xbak\xf7E\x17\xe6\x9c\x18i\v\xaeuR\xfb\xd0\xaa~\xb8\x1b+A\xc6\xc3\xec==\xc4\xbbu\xc6\x91\x88ZL:L\xc5&\xf2\xf0\x06N\xde\xec\xc5\xc4q\x91\xf3\"a$|\x18\x16\x0f\xdf\x91\x00'/349, 0x1, 0x0, &(0x7f0000000040)) 04:05:25 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff}) renameat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 04:05:25 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0), 0x240480, 0x0) 04:05:25 executing program 3: getcwd(0x0, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, &(0x7f00000004c0)) getcwd(0x0, 0x0) 04:05:25 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timerfd_gettime(r0, &(0x7f00000000c0)) [ 460.023316][ T9116] x_tables: duplicate underflow at hook 1 04:05:25 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x222041, 0x0) 04:05:26 executing program 4: syz_clone(0x13846100, &(0x7f0000000000)="f4e60145b7628c5ee2f20dc26e2ed437e44f74cbc052bdb21f4ddf0461d9015fe5b33fb705318de8538c3b6dab0a7cc0cf46", 0x32, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="772cb204f36e655e4225c91f5ef8aa50608651929f7e4fcbe23df2961f74511f621edf879c2b37d7980d4764d62ad99c12e7254fc5276d7c207a31a7e30f3693d2b1441f77c57c7736829f2ec9301baf64d964698b941b4045db655f1d241271") 04:05:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x408, 0x0, 0x110, 0x220, 0x320, 0x320, 0x320, 0x4, 0x0, {[{{@arp={@local, @private, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan0\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @remote, @private}}}, {{@arp={@private, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macsec0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@remote, @multicast1, @local}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x458) 04:05:26 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) bind$inet6(r0, 0x0, 0x0) 04:05:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, 0x0, &(0x7f0000000040)) 04:05:26 executing program 5: mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:05:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x305202, 0x0) ioctl$BINDER_FREEZE(r0, 0x400c620e, 0x0) 04:05:26 executing program 3: socket(0x1, 0x0, 0x1ff) 04:05:26 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x72041, 0x0) 04:05:26 executing program 1: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) write$FUSE_LK(r0, 0x0, 0x0) [ 460.823179][ T9137] x_tables: duplicate underflow at hook 1 04:05:26 executing program 0: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) shmdt(0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) pipe2(&(0x7f0000000800), 0x4880) 04:05:26 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000003900), 0x32000, 0x0) 04:05:26 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, 0x0) 04:05:27 executing program 4: syz_clone(0x13846100, &(0x7f0000000000)="f4e60145b7628c5ee2f20dc26e2ed437e44f74cbc052bdb21f4ddf0461d9015fe5b33fb705318de8538c3b6dab0a7cc0cf46", 0x32, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="772cb204f36e655e4225c91f5ef8aa50608651929f7e4fcbe23df2961f74511f621edf879c2b37d7980d4764d62ad99c12e7254fc5276d7c207a31a7e30f3693d2b1441f77c57c7736829f2ec9301baf64d964698b941b4045db655f1d241271") 04:05:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x408, 0x0, 0x110, 0x220, 0x320, 0x320, 0x320, 0x4, 0x0, {[{{@arp={@local, @private, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan0\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @remote, @private}}}, {{@arp={@private, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macsec0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@remote, @multicast1, @local}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x458) 04:05:27 executing program 1: io_setup(0x401, &(0x7f00000002c0)) 04:05:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00'}) socketpair(0x22, 0x0, 0x0, &(0x7f0000000040)) 04:05:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) 04:05:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 04:05:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={0x0}}, 0x0) 04:05:27 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) connect$pppl2tp(r0, 0x0, 0x0) [ 461.959779][ T9160] x_tables: duplicate underflow at hook 1 04:05:27 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 04:05:27 executing program 0: ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000080)) 04:05:27 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 04:05:28 executing program 5: socketpair(0x1a, 0x0, 0x0, &(0x7f0000001180)) [ 462.422643][ T48] Bluetooth: hci0: command 0x0406 tx timeout [ 462.428767][ T48] Bluetooth: hci2: command 0x0406 tx timeout [ 462.434920][ T5353] Bluetooth: hci5: command 0x0406 tx timeout [ 462.440947][ T5353] Bluetooth: hci3: command 0x0406 tx timeout [ 462.447993][ T5343] Bluetooth: hci1: command 0x0406 tx timeout [ 462.455067][ T5352] Bluetooth: hci4: command 0x0406 tx timeout 04:05:28 executing program 4: syz_clone(0x13846100, &(0x7f0000000000)="f4e60145b7628c5ee2f20dc26e2ed437e44f74cbc052bdb21f4ddf0461d9015fe5b33fb705318de8538c3b6dab0a7cc0cf46", 0x32, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="772cb204f36e655e4225c91f5ef8aa50608651929f7e4fcbe23df2961f74511f621edf879c2b37d7980d4764d62ad99c12e7254fc5276d7c207a31a7e30f3693d2b1441f77c57c7736829f2ec9301baf64d964698b941b4045db655f1d241271") 04:05:28 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 04:05:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8918, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) 04:05:28 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bind$vsock_stream(r0, 0x0, 0x0) 04:05:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 04:05:28 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8c42f4bdcbf78a31) 04:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 04:05:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, &(0x7f0000000140)={[{@acl}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@jqfmt_vfsv1}, {@jqfmt_vfsv0}]}, 0x1, 0x765, &(0x7f00000007c0)="$eJzs3c1rHOUfAPDvbJKmv7Q/E0HQegoIGijdmBpbBQ8VDyJYKOjZdtlsQ80mW7Kb0oSAFhG8CCoeBL307Eu9efXlqv+FB2mpmhYrHiQym9l02+ymm3aTRffzgWmfZ2Y2z/PdZ2aeZ/cZdgLoW+PpP7mIQxHxQRIxmq1PImKonhqMOLGx36211WK6JLG+/tpvSX2fm2urxWh6TepAlnksIr5/N+Jwbmu51eWVuUK5XFrM8pO1+fOT1eWVI+fmC7Ol2dLCsanp6aPHnz1+rHux/vHTysFrH7781Fcn/nrn0Svv/5DEiTiYbWuOo1vGYzx7T4bSt/AOL3W7sB5Lel0B7kt6ag5snOVxKEZjoJ5qY2AvawYA7Ja3ImIdAOgzif4fAPpM43uAm2urxcbS8ZcH/4H5gOsvRsT+jfgb85sbWwazObv99XnQkZvJHTMjSUSMdaH88Yj47Js3vkiX2KV5SIBW3r4UEWfGxrde/5Mt9yzs1NMd7DN+V971D/bOt+n457lW47/c5vgnWox/hlucu/fj3ud/7moXimkrHf+90HRv262m+DNjA1nu//Ux31By9ly5lF7bHoqIiRgaTvNT25QxcePvG+22NY//fv/ozc/T8tP/b++Ruzo4fOdrZgq1woPE3Oz6pYjHB1vFn2y2f9Jm/HuqwzJeef69T9ttS+NP420sW+PfXeuXI55s2f6372hLtr0/cbJ+OEw2DooWvv75k5F25Te3f7qk5Tc+C+yFtP1Hto9/LGm+X7O68zJ+vDz6Xbtt946/9fG/L3m9nt6XrbtYqNUWpyL2Ja9uXX/09msb+cb+afwTT7Q+/7c7/tPPhGc6jH/w2q9f3n/8d+vuh+40/pkdtf/OE1duzbWtdGftP11PTWRrOrn+dVrBB3nvAAAAAAAAAAAAAAAAAAAAAAAAAKBTuYg4GEkuv5nO5fL5jWd4PxIjuXKlWjt8trK0MBP1Z2WPxVCu8VOXo02/hzqV/R5+I3/0rvwzEfFwRHw8/L96Pl+slGd6HTwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAZA60ef5/6pfhXtcOANg1+3tdAQBgz+n/AaD/6P8BoP/o/wGg/+j/AaD/6P8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYZadOnkyX9T/XVotpfubC8tJc5cKRmVJ1Lj+/VMwXK4vn87OVymy5lC9W5u/198qVyvnpWFi6OFkrVWuT1eWV0/OVpYXa6XPzhdnS6VKyJ1EBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM5Ul1fmCuVyaVFCQkJiM9HrKxMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAv8M/AQAA//88jCo0") 04:05:29 executing program 5: renameat2(0xffffffffffffff9c, &(0x7f00000021c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000002200)='./file0\x00', 0x0) 04:05:29 executing program 1: openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) 04:05:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x2, &(0x7f0000000680)=@raw=[@initr0], &(0x7f00000006c0)='GPL\x00', 0x4, 0xce, &(0x7f0000000700)=""/206, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:29 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 463.391854][ T9190] loop0: detected capacity change from 0 to 2048 [ 463.443699][ T9190] journal_path: Lookup failure for './file0' [ 463.449761][ T9190] EXT4-fs: error: could not find journal device path 04:05:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 04:05:30 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b"], 0x80}, 0x1, 0x0, 0x0, 0x16}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, &(0x7f00000010c0)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 04:05:30 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, 0x0) 04:05:30 executing program 5: syz_genetlink_get_family_id$fou(&(0x7f0000000400), 0xffffffffffffffff) 04:05:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 04:05:30 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000001c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000300)={0x0, 0x0, 0x5, &(0x7f0000000240)={0x5, 0xf, 0x5}}) 04:05:30 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/block/zram0', 0x0, 0x0) 04:05:30 executing program 0: read$watch_queue(0xffffffffffffffff, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, 0x0) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$watch_queue(0xffffffffffffffff, &(0x7f0000000580)=""/202, 0xca) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socket(0x1d, 0x80000, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000800)={'nr0\x00'}) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, 0x0) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000880)) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000e00)={0x0, 0x0}) 04:05:30 executing program 3: fspick(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0) 04:05:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 04:05:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 04:05:30 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$fou(&(0x7f0000000400), 0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000019c0)='ns/time\x00') bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 464.438992][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. 04:05:30 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x2, &(0x7f0000000680)=@raw=[@initr0], &(0x7f00000006c0)='GPL\x00', 0x4, 0xce, &(0x7f0000000700)=""/206, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$sw_sync_info(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$igmp6(0xa, 0x3, 0x2) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) [ 464.483986][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.538389][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.612654][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.662866][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.702596][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.772800][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.804883][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.837725][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.882080][ T9213] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 464.994167][ T6271] usb 5-1: new high-speed USB device number 3 using dummy_hcd 04:05:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 04:05:30 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_mreq(r0, 0x29, 0x31, &(0x7f0000000200)={@mcast1}, 0x14) 04:05:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 04:05:30 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b"], 0x80}, 0x1, 0x0, 0x0, 0x16}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, &(0x7f00000010c0)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) [ 465.502872][ T6271] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 465.712986][ T6271] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 465.726840][ T6271] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 465.743015][ T6271] usb 5-1: Product: syz [ 465.752006][ T6271] usb 5-1: Manufacturer: syz [ 465.762619][ T6271] usb 5-1: SerialNumber: syz [ 466.072992][ T6272] usb 5-1: USB disconnect, device number 3 04:05:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, &(0x7f0000000040)={[{@data_err_abort}, {@usrjquota}, {@dioread_nolock}, {@nodelalloc}]}, 0x1, 0x75f, &(0x7f0000000fc0)="$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") write$binfmt_script(0xffffffffffffffff, 0x0, 0x81) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) 04:05:32 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0x4}, 0x0, &(0x7f0000000180)={r0, r1+10000000}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f00000002c0)) 04:05:32 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/zoneinfo\x00', 0x0, 0x0) 04:05:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 04:05:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 04:05:32 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b"], 0x80}, 0x1, 0x0, 0x0, 0x16}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, &(0x7f00000010c0)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 04:05:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0xd}]}}, &(0x7f0000000200)=""/165, 0x26, 0xa5, 0x1}, 0x20) 04:05:32 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$sw_sync_info(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000ec0), 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 466.932029][ T9255] loop4: detected capacity change from 0 to 2048 [ 466.940843][ T9255] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE 04:05:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000a00)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 04:05:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xffffffffffffffdf, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16, @ANYBLOB="20002cbd4b28e139d3e4b70034d4f6abf800000000000000000000000006a3ee2800080004000000000008000200070000000100000000000000000000000000000000000001000000000800"/86], 0x5c}, 0x1, 0x0, 0x0, 0x20008084}, 0x11) 04:05:32 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.log\x00', 0x240, 0x0) 04:05:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="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", 0x14) [ 467.051159][ T9255] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. 04:05:33 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 04:05:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) ppoll(&(0x7f0000000440)=[{r0}], 0x1, 0x0, 0x0, 0x0) 04:05:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000a00)={0x14, r1, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 04:05:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="68000000260001ad"], 0x68}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:05:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5}]}}}]}, 0x3c}}, 0x0) [ 467.316616][ T5346] EXT4-fs (loop4): unmounting filesystem. 04:05:33 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b"], 0x80}, 0x1, 0x0, 0x0, 0x16}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, &(0x7f00000010c0)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 04:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:33 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000)=0x8, 0x4) 04:05:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000004d0000"], 0x38}}, 0x0) 04:05:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'syztnl1\x00', 0x0}) 04:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0x81}]}}}]}, 0x3c}}, 0x0) 04:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000012c0)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x0, 0x0, 0xf, 0x0, "0c9e089c1b4a01860b479037f43d223b3c1b324debec40e57a07f7bd417eb48821996aff1e7154e746be4d7686455261c425a7519cc275d04e6205abd307a0c4fa3838bf399ad5bd35f21907c7988d13"}, 0xd8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000000000000", 0x58}], 0x1) 04:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) 04:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a", 0x4) 04:05:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, r1}) 04:05:34 executing program 1: unshare(0x6c060000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f0000000380)}}], 0x1, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000240)=0x408, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b10eb1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546092d00006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 04:05:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:34 executing program 2: sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) socketpair(0xa, 0x4, 0x0, &(0x7f0000000980)) pipe(0x0) 04:05:34 executing program 3: bpf$BPF_TASK_FD_QUERY(0x12, 0x0, 0x0) 04:05:34 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x7, 0x0, &(0x7f0000000040)) 04:05:34 executing program 3: socket$inet(0x2, 0xa, 0x3ff) 04:05:34 executing program 3: select(0x40, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x7e}, 0x0) 04:05:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) 04:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) 04:05:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:35 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) 04:05:35 executing program 1: unshare(0x6c060000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f0000000380)}}], 0x1, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000240)=0x408, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b10eb1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546092d00006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 04:05:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) 04:05:35 executing program 2: pipe(&(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) select(0x40, &(0x7f00000007c0), &(0x7f0000000800)={0x4}, 0x0, 0x0) 04:05:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004180)={0x18, 0x3, &(0x7f0000004040)=@framed, &(0x7f00000040c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004100), 0x8, 0x10, 0x0}, 0x80) 04:05:35 executing program 2: unshare(0x6c060000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f0000000380)}}], 0x1, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000240)=0x408, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b10eb1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546092d00006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 04:05:35 executing program 5: unshare(0x6c060000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f0000000380)}}], 0x1, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000240)=0x408, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b10eb1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546092d00006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 04:05:35 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x90002001}) 04:05:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x2, 0xec, &(0x7f0000000080)=""/236, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:35 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:05:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) 04:05:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) 04:05:36 executing program 1: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000006c0)) 04:05:36 executing program 3: bpf$BPF_TASK_FD_QUERY(0xe, 0x0, 0x0) 04:05:36 executing program 3: socketpair(0xa, 0x3, 0x5, &(0x7f0000000240)) 04:05:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:36 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000), 0x10) 04:05:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, 0x0, 0x0) 04:05:36 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000680)={'syztnl2\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x4, 0x0, 0x8, 0x60, @private1, @private1, 0x700, 0x7800, 0x0, 0x3f}}) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)=@mpls_getnetconf={0x1c, 0x52, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80c0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$smc(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r2, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000900)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000980)) recvmsg$qrtr(r2, &(0x7f0000003fc0)={&(0x7f00000009c0), 0xc, &(0x7f0000002b40)=[{&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/135, 0x87}, {&(0x7f0000001ac0)=""/114, 0x72}, {&(0x7f0000001b40)=""/4096, 0x1000}], 0x4, &(0x7f0000002b80)=[{0x10}, {0x78, 0x0, 0x0, ""/103}, {0x70, 0x0, 0x0, ""/92}, {0x100, 0x0, 0x0, ""/238}, {0x110, 0x0, 0x0, ""/252}, {0xf8, 0x0, 0x0, ""/225}, {0x1010, 0x0, 0x0, ""/4096}], 0x1410, 0x2040}, 0x38, 0x10003) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004180)={0x18, 0xb, &(0x7f0000004040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_idx={0x18, 0x3}, @func, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000000}, @call={0x85, 0x0, 0x0, 0x98}, @alu={0x4, 0x0, 0x0, 0x9, 0xa, 0x20}]}, &(0x7f00000040c0)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000004100)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000004140)={0x0, 0x2, 0xff}, 0x10}, 0x80) syz_genetlink_get_family_id$gtp(&(0x7f0000004200), r2) 04:05:36 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 04:05:36 executing program 5: socket(0x23, 0x0, 0x3) 04:05:36 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x14}}, 0x0) 04:05:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:36 executing program 3: pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000340)={0x30000019}) 04:05:36 executing program 2: sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 04:05:36 executing program 1: syz_init_net_socket$ax25(0x3, 0x2, 0xcb) 04:05:36 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) connect$qrtr(r0, 0x0, 0x0) 04:05:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:37 executing program 3: r0 = socket(0x25, 0x5, 0x0) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 04:05:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=@ipv4_getrule={0x1c}, 0x1c}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@ipv4_getrule={0x1c}, 0x1c}}, 0x0) 04:05:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x1f, 0x1}, 0x48) 04:05:37 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000980)) 04:05:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:37 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) connect$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) 04:05:37 executing program 1: socket$caif_stream(0x25, 0x1, 0x8) 04:05:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:37 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) connect$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x0, {0x2}}, 0x18) 04:05:37 executing program 2: r0 = epoll_create1(0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 04:05:37 executing program 1: bpf$BPF_TASK_FD_QUERY(0x1b, 0x0, 0x0) 04:05:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:38 executing program 3: socket$inet(0x2, 0x805, 0x1) 04:05:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x21, 0x0, 0x0) 04:05:38 executing program 5: select(0x40, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x7e}, &(0x7f0000000880)={0x77359400}) 04:05:38 executing program 1: select(0x40, &(0x7f00000007c0), 0x0, 0x0, 0x0) 04:05:38 executing program 5: pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000fea000/0x13000)=nil, 0x13000, 0x0, 0x100010, r0, 0x0) 04:05:38 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0}}, 0x0) 04:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:38 executing program 5: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0xf) 04:05:38 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={0x77359400}) 04:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) 04:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x1f, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x0, 0x3}, 0x48) 04:05:39 executing program 1: getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x4) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, &(0x7f0000000980)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) pipe(0x0) 04:05:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x40}}, 0x0) 04:05:39 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x34, r1, 0x405, 0x0, 0x0, {0x2, 0x0, 0x2}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x34}, 0x1, 0x40030000030000}, 0x0) 04:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:39 executing program 3: bpf$BPF_TASK_FD_QUERY(0x1e, 0x0, 0x0) 04:05:39 executing program 5: pipe(&(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) select(0x40, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x7e}, 0x0) [ 473.694860][ T9495] smc: net device wlan1 applied user defined pnetid SYZ1 04:05:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:40 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read$alg(r0, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r0, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:40 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) 04:05:40 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x4000800) socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, 0x0) pipe(0x0) 04:05:40 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, 0x0, 0x0) 04:05:40 executing program 1: bpf$BPF_TASK_FD_QUERY(0x13, 0x0, 0x0) 04:05:40 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read$alg(r0, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r0, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x7, 0x0, 0x0) 04:05:40 executing program 3: bpf$BPF_TASK_FD_QUERY(0xb, 0x0, 0x0) 04:05:40 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read$alg(r0, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r0, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:40 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x38, 0x0) 04:05:40 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) 04:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:41 executing program 1: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x43f6a04eacc5f03a) 04:05:41 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0xa8041, 0x0) 04:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:41 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000004280)=ANY=[], 0x2c) 04:05:41 executing program 5: pipe(&(0x7f0000002080)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 04:05:41 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 04:05:41 executing program 2: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x20}, 0x0, 0x0) 04:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:41 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000002140)) 04:05:41 executing program 5: semctl$SEM_INFO(0xffffffffffffffff, 0x2, 0x13, &(0x7f0000000040)=""/238) 04:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:41 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xa2040, 0x0) 04:05:41 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, 0x0) 04:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:41 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000080)={{0x3, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 04:05:41 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f00000016c0)=[{0x0, 0xf800}], 0x1) 04:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:41 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80100, 0x0) 04:05:41 executing program 2: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 04:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:41 executing program 3: mq_open(&(0x7f0000000000)='@-*\x00', 0x800, 0x50, &(0x7f0000000040)) 04:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:41 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)="5e4abe") 04:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:41 executing program 3: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, &(0x7f0000000100)=""/250) 04:05:41 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x212c0, 0x0) 04:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:42 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_pressure(r0, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) 04:05:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 04:05:42 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000200)={@dev, @empty, @void, {@mpls_uc={0x8847, {[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "89d27d", 0x0, "b1e39b"}}}}}}}, 0x0) 04:05:42 executing program 2: mq_open(&(0x7f0000000000)='@-*\x00', 0x800, 0x50, 0x0) 04:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:42 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 04:05:42 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000001780)=""/132) 04:05:42 executing program 2: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00') 04:05:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, 0x0) 04:05:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:42 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semctl$GETVAL(r0, 0x2, 0xc, &(0x7f0000000200)=""/195) 04:05:42 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x2c) 04:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:42 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, 0x0, 0x0) 04:05:42 executing program 3: semget$private(0x0, 0x3, 0x197d2b47c3a284ba) 04:05:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 04:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:42 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 04:05:42 executing program 3: r0 = getpid() prlimit64(r0, 0xe, 0x0, 0x0) 04:05:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000016c0), 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) 04:05:42 executing program 2: io_setup(0x0, &(0x7f0000000100)) 04:05:42 executing program 3: semctl$SEM_INFO(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000100)=""/249) 04:05:42 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r0, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 04:05:42 executing program 5: r0 = semget(0x2, 0x0, 0x0) semctl$GETVAL(r0, 0x0, 0xc, 0x0) 04:05:42 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) 04:05:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 04:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:42 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r0, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x301000, 0x0) 04:05:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) read$FUSE(r0, 0x0, 0xfffffdc7) 04:05:42 executing program 2: semget$private(0x0, 0x3, 0x500) 04:05:42 executing program 3: mount$fuse(0x0, &(0x7f00000021c0)='./file0\x00', 0x0, 0x100000, 0x0) 04:05:43 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r0, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000000)=""/75) 04:05:43 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r0, 0x4, 0x3, &(0x7f0000000080)=""/151) 04:05:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 04:05:43 executing program 3: msgget$private(0x0, 0x36a) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) 04:05:43 executing program 5: fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 04:05:43 executing program 2: mq_open(&(0x7f0000000000)='@-*\x00', 0x800, 0x95, 0x0) 04:05:43 executing program 3: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) 04:05:43 executing program 5: prlimit64(0x0, 0x4, 0x0, &(0x7f0000000040)) 04:05:43 executing program 2: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f00000016c0)=[{}], 0x1) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 3: r0 = semget(0x0, 0x0, 0x0) semctl$GETPID(r0, 0x0, 0xb, 0x0) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) write$FUSE_LK(r1, &(0x7f0000008440)={0x28}, 0x28) 04:05:43 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 04:05:43 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000180)=""/91) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e96", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000002040), 0x200, 0x0) 04:05:43 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 04:05:43 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000004200), &(0x7f0000004280)={0x0}) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 1: prlimit64(0x0, 0xf, &(0x7f0000000000), 0x0) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e96", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xa0040, 0x0) read$FUSE(r0, 0x0, 0x0) 04:05:43 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1a7340, 0x0) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 04:05:43 executing program 1: mq_open(&(0x7f0000000000)='@-*\x00', 0x800, 0x190, 0x0) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e96", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 2: timer_create(0x0, &(0x7f0000001100)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) [ 477.916836][ T27] audit: type=1800 audit(1669262743.711:17): pid=9725 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name=".log" dev="sda1" ino=1169 res=0 errno=0 04:05:43 executing program 5: msgrcv(0x0, 0x0, 0xe6, 0x0, 0x0) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 3: mq_open(&(0x7f0000000140)='@-*\x00', 0x800, 0x142, 0x0) 04:05:43 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x6501, 0x0) 04:05:43 executing program 2: prlimit64(0x0, 0x2, &(0x7f00000020c0), 0x0) 04:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe4", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:43 executing program 5: r0 = getegid() chown(&(0x7f0000000000)='.\x00', 0x0, r0) 04:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:43 executing program 3: chown(&(0x7f0000000040)='.\x00', 0xee00, 0xee01) 04:05:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/dev\x00') write$FUSE_INTERRUPT(r0, 0x0, 0xffffffffffffff3d) 04:05:43 executing program 1: r0 = socket(0x1, 0x5, 0x0) write$cgroup_subtree(r0, 0x0, 0xf) 04:05:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000380)=""/108, 0x6c, 0x42, 0x0, 0x0) 04:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe4", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') write$FUSE_DIRENT(r0, 0x0, 0x0) 04:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:44 executing program 2: r0 = socket(0x1, 0x5, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x100, 0x0, 0x0) 04:05:44 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x4000, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 04:05:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x5f) 04:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe4", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') write$P9_RLOCK(r0, 0x0, 0x4) 04:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:44 executing program 3: r0 = socket(0xa, 0x2, 0x0) write$eventfd(r0, 0x0, 0x0) 04:05:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000)=ANY=[], 0xa) 04:05:44 executing program 2: chown(&(0x7f0000000040)='.\x00', 0x0, 0xee01) 04:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0c", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:44 executing program 3: r0 = getuid() chown(&(0x7f0000000000)='.\x00', r0, 0xee01) 04:05:44 executing program 5: r0 = syz_clone(0x20085000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs$userns(r0, &(0x7f0000000000)) 04:05:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') write$cgroup_subtree(r0, 0x0, 0x0) 04:05:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') write$cgroup_netprio_ifpriomap(r0, 0x0, 0xa) 04:05:44 executing program 3: chown(&(0x7f0000000000)='.\x00', 0xffffffffffffffff, 0x0) 04:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0c", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') write$cgroup_subtree(r0, 0x0, 0x0) 04:05:44 executing program 2: r0 = inotify_init1(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) 04:05:44 executing program 5: r0 = syz_clone(0x20085000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs$userns(r0, &(0x7f0000000000)) 04:05:44 executing program 3: r0 = socket(0x1, 0x5, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 04:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0c", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') write$cgroup_subtree(r0, 0x0, 0x0) 04:05:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') write$P9_ROPEN(r0, 0x0, 0x0) 04:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd6", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') write$cgroup_subtree(r0, 0x0, 0x0) 04:05:44 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) 04:05:44 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 04:05:44 executing program 5: r0 = syz_clone(0x20085000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs$userns(r0, &(0x7f0000000000)) 04:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:45 executing program 2: syz_clone(0x40808000, 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)="a6074fdac696f27c68c70d5be2edb91522fd98961740d811c2000400ff672bf5c0e4a8e872b167ac976571c4d2cf7b6f2a9207ecae2957fa87444137c13fffdb75f7ec1ddc88c3832b0c3a59760cae78a9727305705dd6aa3e936527d5378cb2d1fdb621cc5a04c8ea7d8a46f313b59ac059ea9f321eef316186e8fb44b743441cdf058d94dd44e7e885619290382570e1ee0f4af0322fb32eca3ca1c594cb33860394534f7bfdfc8f2231201bb09c1215892171f643cc9181f030a8933af3d7c7aef2196292d1e58c7afd6c6f3a397d99e24a373e75f08203ada6a9305fd067ce931557ad4ff60d7d6c") 04:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd6", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e96", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:45 executing program 5: r0 = syz_clone(0x20085000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs$userns(r0, &(0x7f0000000000)) 04:05:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f00000000c0)) 04:05:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='.\x00', 0x1cc10, &(0x7f0000000080)={[{@journal_async_commit}, {@sysvgroups}]}, 0x3, 0x762, &(0x7f0000000800)="$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") 04:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd6", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a1, 0x0) 04:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e96", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:45 executing program 3: pipe(&(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x4020940d, &(0x7f0000000000)) [ 479.445459][ T9846] loop1: detected capacity change from 0 to 2048 04:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e96", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x80108907, 0x0) [ 479.544860][ T9846] EXT4-fs: Mount option(s) incompatible with ext3 04:05:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='.\x00', 0x1cc10, &(0x7f0000000080)={[{@journal_async_commit}, {@sysvgroups}]}, 0x3, 0x762, &(0x7f0000000800)="$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") 04:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe4", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:45 executing program 3: pipe(&(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x4020940d, &(0x7f0000000000)) 04:05:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) 04:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8942, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:45 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x541b, &(0x7f0000000040)={'tunl0\x00', 0x0}) 04:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe4", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:45 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x5452, &(0x7f0000000640)) 04:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe4", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) [ 479.928169][ T9877] loop1: detected capacity change from 0 to 2048 [ 480.033360][ T9877] EXT4-fs: Mount option(s) incompatible with ext3 04:05:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='.\x00', 0x1cc10, &(0x7f0000000080)={[{@journal_async_commit}, {@sysvgroups}]}, 0x3, 0x762, &(0x7f0000000800)="$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") 04:05:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 04:05:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x4020940d, 0x0) 04:05:45 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x1c000, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000240)='GPL\x00', 0x0, 0xf0, &(0x7f0000000280)=""/240, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0c", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8949, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:46 executing program 2: bpf$MAP_UPDATE_ELEM(0x17, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 04:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0c", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:46 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) pipe(&(0x7f0000000b40)) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8901, &(0x7f0000000640)) 04:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 480.417341][ T9901] loop1: detected capacity change from 0 to 2048 [ 480.467285][ T9901] EXT4-fs: Mount option(s) incompatible with ext3 04:05:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='.\x00', 0x1cc10, &(0x7f0000000080)={[{@journal_async_commit}, {@sysvgroups}]}, 0x3, 0x762, &(0x7f0000000800)="$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") 04:05:46 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x11, 0x0, 0x0) 04:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0c", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x10}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5452, 0x0) 04:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0x3, 0x0, 0x0) 04:05:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x40049409, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd6", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x890b, 0x0) 04:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 480.847683][ T9916] loop1: detected capacity change from 0 to 2048 [ 480.872102][ T9916] EXT4-fs: Mount option(s) incompatible with ext3 04:05:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst, @generic={0xd6}], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xae, &(0x7f0000000080)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd6", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:46 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x891c, &(0x7f0000000640)) 04:05:46 executing program 5: bpf$PROG_LOAD_XDP(0x13, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:46 executing program 3: bpf$MAP_UPDATE_ELEM(0x1e, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 04:05:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8932, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:47 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x2, @local}}}}) 04:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd6", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:47 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x401c5820, &(0x7f0000000640)) 04:05:47 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x2, @local}}}}) 04:05:47 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) 04:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:47 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x2, @local}}}}) 04:05:47 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x1, &(0x7f0000000380)=@framed={{}, [@map_idx, @map_val, @map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @func, @map_fd, @map_idx, @btf_id, @kfunc, @call]}, &(0x7f0000000240)='GPL\x00', 0x2, 0xf0, &(0x7f0000000280)=""/238, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff0d, 0x10, 0x0}, 0x80) 04:05:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @remote}, 'nicvf0\x00'}) 04:05:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1b}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89a2, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:47 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x2, @local}}}}) 04:05:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8920, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0x48, 0x0, 0x0) 04:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:48 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x890c, 0x0) 04:05:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:48 executing program 5: bpf$PROG_LOAD_XDP(0x21, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x88, 0x40, 0x0, 0x0) 04:05:48 executing program 1: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x6372328fb7c6a7b9) 04:05:48 executing program 2: pipe(&(0x7f0000002780)) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 04:05:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000000)={@broadcast, @local, @loopback}, 0xc) 04:05:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 04:05:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}}}}) 04:05:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:49 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, 0x0) 04:05:49 executing program 5: bpf$MAP_UPDATE_ELEM(0x12, 0x0, 0x0) 04:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x17, 0x0, 0xffffff04, 0xffffb09e, 0x1001}, 0x48) 04:05:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x1, &(0x7f0000000200)=@raw=[@exit={0x95, 0x0, 0x0, 0x18}], &(0x7f0000000240)='GPL\x00', 0x2, 0xf0, &(0x7f0000000280)=""/240, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x69}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 04:05:50 executing program 3: bpf$MAP_UPDATE_ELEM(0x1a, 0x0, 0x0) 04:05:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0xc020660b, 0x0) 04:05:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:50 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private=0xa010101}}}}) 04:05:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:50 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8919, &(0x7f0000000640)) 04:05:50 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8953, 0x0) 04:05:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6a}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8941, 0x0) 04:05:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 04:05:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x40086602, 0x0) 04:05:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0xa8, &(0x7f0000000100)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:51 executing program 2: r0 = socket(0x11, 0x2, 0x0) ioctl$SIOCGETSGCNT(r0, 0x89e1, 0x0) 04:05:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@empty, @empty, 0x2}}) 04:05:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:51 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8914, 0x0) 04:05:51 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x40086602, &(0x7f0000000640)) 04:05:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x5, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 04:05:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x5, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0x4a, 0x0, 0x0) 04:05:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900), 0x0, 0x0) 04:05:52 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x4, 0x1, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x48) 04:05:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'xfrm0\x00'}) 04:05:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:52 executing program 5: bpf$MAP_UPDATE_ELEM(0x21, 0x0, 0x0) 04:05:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891c, 0x0) 04:05:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x891f, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 04:05:52 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x10, 0x0, 0x0) 04:05:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x4, 0x1687, 0xd, 0x1}, 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e80)={0x0, &(0x7f0000000e00)=""/77, &(0x7f0000000f00), 0x0, 0x0, r0}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x2}, 0x48) 04:05:52 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000480)=@security={'security\x00', 0xe, 0x4, 0x2c0, 0xffffffff, 0x190, 0x0, 0x190, 0xffffffff, 0xffffffff, 0x228, 0x228, 0x228, 0xffffffff, 0x4, 0x0, {[{{@ip={@rand_addr, @loopback, 0x0, 0x0, 'ip_vti0\x00', 'syzkaller0\x00', {}, {}, 0x0, 0x0, 0x80}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xe0}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "ba73d1f491b123aee1f89f76fdeae99bc1ca595ae46336c3b8f3c9ba4b715dc25e40f2e68816cd4b2de5aef5c5fbca2200a3ca4d9495143606103325ee06a478"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@AUDIT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x320) 04:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900), 0x0, 0x0) 04:05:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:53 executing program 3: bpf$MAP_UPDATE_ELEM(0x21, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 04:05:53 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYBLOB="000007000000000000000000454000140100000202009078ac141414ac14"]}) 04:05:53 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @private}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0xe8}]}}}], 0x18}}], 0x1, 0x0) 04:05:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:53 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8948, &(0x7f0000000200)={'bond0\x00', 0x0}) 04:05:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0x3a, 0x0, 0x0) 04:05:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x46, 0x0, 0x0) 04:05:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8912, 0x0) 04:05:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, 0x0, 0x0) 04:05:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900), 0x0, 0x0) 04:05:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000140)={@loopback, @broadcast}, 0x8) 04:05:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900), 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:54 executing program 1: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_1\x00'}) 04:05:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x20000444, 0x360, 0xffffffff, 0x160, 0x0, 0x160, 0xffffffff, 0xffffffff, 0x4f0, 0x4f0, 0x4f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @empty, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private0, [], [], 'netdevsim0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'pim6reg1\x00', 'lo\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 04:05:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r1, @ANYBLOB="01002dbd7000ffdbdf25100000000e0009"], 0xd0}}, 0x0) 04:05:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x890d, 0x0) 04:05:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8990, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) [ 488.575693][T10165] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 488.611233][T10165] __nla_validate_parse: 1965 callbacks suppressed [ 488.611253][T10165] netlink: 172 bytes leftover after parsing attributes in process `syz-executor.3'. 04:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8902, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:55 executing program 1: bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 04:05:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, &(0x7f0000000380)=@nat={'nat\x00', 0x1b, 0x5, 0x348, 0x0, 0xc8, 0xffffffff, 0xc8, 0xc8, 0x3a0, 0x3a0, 0xffffffff, 0x3a0, 0x3a0, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @private, @multicast2, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local, @icmp_id, @gre_key}}}}, {{@ip={@empty, @rand_addr, 0x0, 0x0, 'bond_slave_1\x00', 'veth0_to_bond\x00'}, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@dev, @ipv6=@loopback, @port, @icmp_id}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a8) 04:05:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900), 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="c1dffbf024f5"}, 0x14) 04:05:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5460, 0x0) 04:05:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000002e00)={0xb, 0x3, &(0x7f0000001cc0)=@framed, &(0x7f0000001d00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x17, 0x0, 0x0) 04:05:55 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00'}, 0x10) 04:05:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000340)={'sit0\x00', 0x0}) 04:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x7, &(0x7f0000000380)=@nat={'nat\x00', 0x1b, 0x5, 0x348, 0x0, 0xc8, 0xffffffff, 0xc8, 0xc8, 0x3a0, 0x3a0, 0xffffffff, 0x3a0, 0x3a0, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @private, @multicast2, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local, @icmp_id, @gre_key}}}}, {{@ip={@empty, @rand_addr, 0x0, 0x0, 'bond_slave_1\x00', 'veth0_to_bond\x00'}, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@dev, @ipv6=@loopback, @port, @icmp_id}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a8) 04:05:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8922, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @dev}}}}) 04:05:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:05:56 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x1c, 0x2, &(0x7f0000000000)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900), 0x0, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 04:05:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f0000000080)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:56 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 04:05:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002340)={0x6, 0x1, &(0x7f0000000e80)=@raw=[@call], &(0x7f0000000f00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000240)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1}, &(0x7f0000000280)=0x20) 04:05:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="30010000", @ANYRES16=r1, @ANYBLOB="010027bd7000fbdbdf25060000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000006000400010000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000060004"], 0x130}}, 0x0) 04:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x8901, &(0x7f0000000040)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @private}, {0x2, 0x0, @private}}) 04:05:56 executing program 2: bpf$MAP_CREATE(0x12, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:05:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0xf, 0x6, 0x3}, 0x14}}, 0x0) 04:05:56 executing program 5: ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002340)={0x6, 0x4, &(0x7f0000000e80)=@raw=[@map_idx_val, @cb_func], &(0x7f0000000f00)='GPL\x00', 0x4, 0x1000, &(0x7f0000000f40)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000003140)={&(0x7f00000020c0)={0xd04, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_MATCH={0xcc1, 0x5b, "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"}]}, 0xd04}}, 0x0) 04:05:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x39, 0x0, &(0x7f0000000080)) 04:05:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x22, 0x0, 0x0) 04:05:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000700)={'gre0\x00', &(0x7f0000000680)={'sit0\x00', 0x0, 0x0, 0x8e2e, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 04:05:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @private}}}}) 04:05:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:57 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x8, 0x2, &(0x7f0000000000)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:57 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x3e9, 0x2, &(0x7f0000000000)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x34, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x34}}, 0x0) 04:05:57 executing program 2: recvmsg(0xffffffffffffffff, 0x0, 0x80000040) 04:05:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f0000004180)={&(0x7f00000040c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000004140)={&(0x7f0000004100)={0x14}, 0x14}}, 0x0) 04:05:57 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f00000001c0)) 04:05:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@private0}, 0x14) 04:05:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x8, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_SCHED_SCAN_DELAY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40880}, 0xc010) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000880), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40080}, 0x40) 04:05:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 04:05:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2a, 0x0, 0x0) 04:05:58 executing program 3: pipe(&(0x7f0000001800)={0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001a40), r0) 04:05:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x8, 0x0, &(0x7f0000000080)) 04:05:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 04:05:58 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@dev, @multicast, @val, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 04:05:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0xf, 0x0, &(0x7f0000000080)) 04:05:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8937, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000009c0)={'ip6gre0\x00', &(0x7f0000000940)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, 0x7}}) 04:05:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, r1, 0x70d, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 04:05:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000000)) 04:05:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:05:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x80108906, 0x0) 04:05:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002340)={0x6, 0x2, &(0x7f0000000e80)=@raw=[@map_idx_val], &(0x7f0000000f00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:05:59 executing program 1: pipe(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, 0x0, 0x0) 04:05:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000440)={@mcast1}, 0x14) 04:05:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8953, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:05:59 executing program 2: pipe(&(0x7f0000000880)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0x0, 0x3, &(0x7f00000027c0)=@framed, &(0x7f0000002840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 04:05:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 04:05:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:05:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@nat={'nat\x00', 0x1b, 0x5, 0x20000728, 0x0, 0xc8, 0xffffffff, 0xc8, 0xc8, 0x3a0, 0x3a0, 0xffffffff, 0x3a0, 0x3a0, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @private, @multicast2, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local, @icmp_id, @gre_key}}}}, {{@ip={@empty, @rand_addr, 0x0, 0x0, 'bond_slave_1\x00', 'veth0_to_bond\x00'}, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@dev, @ipv6=@loopback, @port, @icmp_id}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a8) 04:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000076c0)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000780)="dd", 0x1}], 0x1}}], 0x1, 0x0) 04:05:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x12, 0x0, 0x0, 0x9}, 0x48) 04:06:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {0x0}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x2102) sendmmsg$unix(r0, &(0x7f0000004240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:06:00 executing program 1: sendmsg$IEEE802154_LIST_PHY(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 04:06:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x11, 0x8100, r2, 0x1, 0x0, 0x6, @random="c1dffbf024f5"}, 0x14) 04:06:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8934, &(0x7f0000000080)={'tunl0\x00', 0x0}) 04:06:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {0x0}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="654d00000000000002004e23ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005"], 0x2e1) 04:06:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f00000004c0)='GPL\x00', 0x3, 0xcf, &(0x7f0000000800)=""/207, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x2102) sendmmsg$unix(r0, &(0x7f0000004240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:06:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r1, 0x70d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) 04:06:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "9f"}]}}, &(0x7f0000000200)=""/187, 0x2a, 0xbb, 0x1}, 0x20) 04:06:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x17, 0x0, &(0x7f0000000080)) 04:06:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {0x0}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r1, 0x70d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) 04:06:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x0, 0x4}, 0x48) 04:06:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x2102) sendmmsg$unix(r0, &(0x7f0000004240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:06:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0500000000000000000004"], 0x34}}, 0x0) 04:06:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {0x0}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x8982, 0x0) [ 495.906682][T10353] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 04:06:01 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000005dc0), 0x1, 0x2000c8c9) 04:06:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r1, 0x70d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) 04:06:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x2102) sendmmsg$unix(r0, &(0x7f0000004240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:06:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000001580)) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 04:06:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000080)=0x7) 04:06:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {0x0}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r1, 0x70d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) 04:06:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000001580)) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 04:06:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0x2c}}, 0x0) 04:06:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x43, 0x0, 0x0) 04:06:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {0x0}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000001580)) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 04:06:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f00000003c0), 0x4) 04:06:02 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000400)=@raw=[@exit], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:02 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x101000, 0x0) 04:06:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000001580)) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 04:06:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000a00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x293, 0x0, 0x168}, 0x0) 04:06:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:03 executing program 2: r0 = syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000280)=r0, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'erspan0\x00', 0x10}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x17, 0x0, 0x0, 0x0, 0x0, 0x43, &(0x7f0000000840)=""/67, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4, 0x0, &(0x7f0000000980)}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r4, &(0x7f0000000040)="de56628b3870016a27142109487309b396f7cd46", &(0x7f0000000080)=""/248, 0x4}, 0x20) 04:06:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0), 0x4) 04:06:03 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000bc0)='ns/net\x00') 04:06:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0xe8e4e961473f9a9b) 04:06:03 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/time\x00') 04:06:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000080)=""/204, 0x26, 0xcc, 0x1}, 0x20) 04:06:03 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000029c0)={0xffffffffffffffff, 0x24, 0x0, 0x0, 0x0}, 0x20) 04:06:03 executing program 1: bpf$BPF_PROG_TEST_RUN(0x6, 0x0, 0x49) 04:06:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff}) close(r0) 04:06:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x4000, &(0x7f0000000300)=@raw=[@exit, @initr0, @func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f00000003c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:04 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x48) 04:06:04 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x19, 0x1, &(0x7f0000000300)=@raw=[@exit], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:04 executing program 2: r0 = syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000280)=r0, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'erspan0\x00', 0x10}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x17, 0x0, 0x0, 0x0, 0x0, 0x43, &(0x7f0000000840)=""/67, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4, 0x0, &(0x7f0000000980)}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r4, &(0x7f0000000040)="de56628b3870016a27142109487309b396f7cd46", &(0x7f0000000080)=""/248, 0x4}, 0x20) 04:06:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:04 executing program 1: bpf$PROG_LOAD_XDP(0xf, &(0x7f00000013c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 04:06:04 executing program 5: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/clear_refs\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f00000000c0)='4\x00', 0x2) 04:06:04 executing program 1: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000140)=ANY=[@ANYBLOB=' /'], 0x8) 04:06:04 executing program 3: fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) 04:06:04 executing program 5: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/clear_refs\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f00000000c0)='4\x00', 0x2) 04:06:04 executing program 1: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000140)=ANY=[@ANYBLOB=' /'], 0x8) 04:06:05 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) 04:06:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') writev(r0, &(0x7f0000001380)=[{&(0x7f00000001c0)="ed", 0x1}], 0x1) 04:06:05 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup2(r0, r1) read$FUSE(r2, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r3, 0x0) 04:06:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:05 executing program 2: r0 = syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000280)=r0, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'erspan0\x00', 0x10}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x17, 0x0, 0x0, 0x0, 0x0, 0x43, &(0x7f0000000840)=""/67, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4, 0x0, &(0x7f0000000980)}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r4, &(0x7f0000000040)="de56628b3870016a27142109487309b396f7cd46", &(0x7f0000000080)=""/248, 0x4}, 0x20) 04:06:05 executing program 3: fsopen(&(0x7f0000000080)='rpc_pipefs\x00', 0x0) 04:06:05 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readlinkat(r0, &(0x7f0000000080)='\x00', &(0x7f00000000c0)=""/189, 0xbd) 04:06:05 executing program 1: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, 0x0, 0x0) 04:06:05 executing program 3: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000040), 0x40001, 0x0) write$damon_schemes(r0, 0x0, 0x16) 04:06:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') r1 = fcntl$dupfd(r0, 0x0, r0) read$snapshot(r1, 0x0, 0x0) 04:06:05 executing program 1: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, 0x0, 0x0) 04:06:05 executing program 5: syz_io_uring_setup(0x4af9, &(0x7f0000000140), &(0x7f0000000000/0x4000)=nil, &(0x7f0000001000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 04:06:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_mr_cache\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) 04:06:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512b", 0x1c}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:06 executing program 1: name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', &(0x7f0000000200)=@reiserfs_5, &(0x7f00000001c0), 0x0) 04:06:06 executing program 5: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) r1 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) dup2(r0, r1) 04:06:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) 04:06:06 executing program 2: r0 = syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000280)=r0, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'erspan0\x00', 0x10}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x17, 0x0, 0x0, 0x0, 0x0, 0x43, &(0x7f0000000840)=""/67, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4, 0x0, &(0x7f0000000980)}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r4, &(0x7f0000000040)="de56628b3870016a27142109487309b396f7cd46", &(0x7f0000000080)=""/248, 0x4}, 0x20) 04:06:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac", 0x26}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) read$ptp(r0, &(0x7f00000022c0)=""/196, 0xc4) 04:06:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') read$ptp(r0, &(0x7f0000000140), 0x25) 04:06:06 executing program 5: open$dir(&(0x7f0000000240)='./file0\x00', 0x42, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0) 04:06:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) read$ptp(r0, &(0x7f00000022c0)=""/196, 0xc4) 04:06:06 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xff}}, './file0\x00'}) fchmodat(r0, &(0x7f0000000580)='./file0\x00', 0x145) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_triestat\x00') read$ptp(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x8081, 0x0) pwritev2(r2, &(0x7f00000004c0)=[{&(0x7f0000000040)}, {&(0x7f0000000180)}, {&(0x7f0000000200)="5e2fea6f7b6d69ae9823972e933802e99caebbdd42323957", 0x18}, {&(0x7f0000000240)="687ffb2313884bd1cd", 0x9}, {&(0x7f0000000280)}], 0x5, 0x0, 0x7, 0x10) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_dsack\x00', 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) write$snapshot(r4, &(0x7f0000000300)="13", 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f0000001080)={0x2020}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000003180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, 0x0) lstat(&(0x7f00000041c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000005240)='./file0\x00', 0x0, 0x4000) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs$namespace(r7, &(0x7f0000000040)='ns/time\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000030c0)={0xa0, 0xffffffffffffffda, 0x0, {{0x0, 0x3, 0x2, 0x0, 0x0, 0x0, {0x0, 0x0, 0xd1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x100, 0xffffffffffffffff, 0xee01}}}}, 0xa0) openat$fuse(0xffffffffffffff9c, &(0x7f0000003180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000031c0)={{0x1, 0x1, 0x18}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) lstat(0x0, &(0x7f00000051c0)) 04:06:06 executing program 5: fsopen(&(0x7f0000000280)='nfs\x00', 0x0) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[], 0x0, 0x0, &(0x7f0000000000)) [ 500.867314][T10510] fuse: Unknown parameter 'nfs' [ 501.304021][ T1241] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.310466][ T1241] ieee802154 phy1 wpan1: encryption failed: -22 04:06:07 executing program 1: r0 = fsopen(&(0x7f00000000c0)='xfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000008700)={0x60}, 0x60) r2 = dup2(r0, r1) read$FUSE(r2, &(0x7f0000008800)={0x2020}, 0x2020) 04:06:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512b", 0x1c}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:07 executing program 3: r0 = fsopen(&(0x7f00000000c0)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000200)='\'\x00', &(0x7f0000000480)='./file0\x00', 0xffffffffffffff9c) 04:06:07 executing program 5: fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0) 04:06:07 executing program 2: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') read$proc_mixer(r0, &(0x7f0000000040)=""/110, 0x6e) 04:06:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac", 0x26}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:07 executing program 2: r0 = fsopen(&(0x7f0000000040)='omfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 04:06:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') r1 = fcntl$dupfd(r0, 0x0, r0) read$snapshot(r1, &(0x7f00000001c0)=""/68, 0x44) 04:06:07 executing program 1: r0 = fsopen(&(0x7f0000000300)='jfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 04:06:07 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) pselect6(0x40, &(0x7f0000001240), &(0x7f0000001280)={0x9}, 0x0, 0x0, 0x0) 04:06:07 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x281, 0x0) writev(r0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000000)='f', 0x1}], 0x2) 04:06:07 executing program 5: r0 = fsopen(&(0x7f0000000000)='squashfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x4, &(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 04:06:07 executing program 1: r0 = syz_io_uring_setup(0x6574, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(0xffffffffffffffff, r1) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='memory.pressure\x00', 0x2, 0x0) io_uring_enter(r0, 0x3b28, 0x0, 0xc, &(0x7f0000000000)={[0x1102]}, 0x8) 04:06:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512b", 0x1c}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) 04:06:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x10, &(0x7f0000000080)={[{@test_dummy_encryption}, {@stripe={'stripe', 0x3d, 0x5}}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@grpquota}, {@errors_continue}, {@nombcache}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='devices.list\x00', 0x275a, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x400c6615, 0x0) 04:06:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_vif\x00') read$FUSE(r0, &(0x7f0000004200)={0x2020}, 0x2020) read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) 04:06:08 executing program 1: name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000140)='\x00', &(0x7f0000000180)=@ceph_nfs_snapfh={0x1c}, &(0x7f00000001c0), 0x1400) 04:06:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac", 0x26}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:08 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='children\x00') 04:06:08 executing program 3: openat$vicodec0(0xffffffffffffff9c, &(0x7f00000078c0), 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/mnt\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) [ 502.446002][T10544] loop5: detected capacity change from 0 to 128 04:06:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x10, &(0x7f0000000080)={[{@test_dummy_encryption}, {@stripe={'stripe', 0x3d, 0x5}}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@grpquota}, {@errors_continue}, {@nombcache}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='devices.list\x00', 0x275a, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) 04:06:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='timers\x00') 04:06:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) read$ptp(r0, &(0x7f0000000040)=""/179, 0xb3) 04:06:08 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12040, 0x0) mount$cgroup(0x20100000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) [ 502.673454][T10558] loop1: detected capacity change from 0 to 128 [ 502.980553][T10544] EXT4-fs (loop5): Test dummy encryption mode enabled [ 503.015268][T10544] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 503.025968][T10558] EXT4-fs (loop1): Test dummy encryption mode enabled [ 503.047681][T10544] ext4 filesystem being mounted at /root/syzkaller-testdir1860086974/syzkaller.W7dSL3/345/mnt supports timestamps until 2038 (0x7fffffff) [ 503.073254][T10558] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 503.090631][T10558] ext4 filesystem being mounted at /root/syzkaller-testdir3064542888/syzkaller.EBHx9f/330/mnt supports timestamps until 2038 (0x7fffffff) [ 503.124836][T10544] fscrypt: AES-256-XTS using implementation "xts-aes-aesni" [ 503.183451][ T5348] EXT4-fs (loop5): unmounting filesystem. [ 503.191595][ T5344] EXT4-fs (loop1): unmounting filesystem. 04:06:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b", 0x2a}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:09 executing program 2: fsopen(&(0x7f0000000040)='squashfs\x00', 0x0) 04:06:09 executing program 3: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000040), 0x40001, 0x0) write$damon_schemes(r0, &(0x7f0000000080), 0x66) write$damon_schemes(r0, 0x0, 0x0) 04:06:09 executing program 5: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000000)=[{' ', './file0'}, {' ', './file0'}, {' ', './file0'}, {' ', './file0'}], 0x4) 04:06:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 04:06:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41", 0x39}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:09 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f00000001c0)='7\x00', 0x3fffff) 04:06:09 executing program 3: fsopen(&(0x7f0000000080)='sockfs\x00', 0x0) 04:06:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(&(0x7f0000000080)='./file0\x00', 0x4f6102, 0x0) 04:06:09 executing program 1: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000140)=ANY=[@ANYBLOB=' ./f'], 0x8) 04:06:09 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x260001, 0x0) [ 503.523369][T10589] loop5: detected capacity change from 0 to 512 04:06:09 executing program 1: mount$cgroup(0x1020, 0x0, 0x0, 0x0, 0x0) [ 503.593466][T10589] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 503.714405][ T5348] EXT4-fs (loop5): unmounting filesystem. 04:06:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b", 0x2a}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:10 executing program 2: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup2(r0, r1) 04:06:10 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup2(r0, r1) 04:06:10 executing program 3: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f0000000000)='2\x00', 0x1) 04:06:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(&(0x7f0000000080)='./file0\x00', 0x4f6102, 0x0) 04:06:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41", 0x39}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$ptp(r0, 0x0, 0x0) 04:06:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') read$ptp(r0, &(0x7f0000000180)=""/183, 0x7ffff000) [ 504.267269][T10603] loop5: detected capacity change from 0 to 512 04:06:10 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r0, r1) 04:06:10 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_mr_cache\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) read$proc_mixer(r0, &(0x7f0000000040)=""/110, 0x6e) 04:06:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_snmp6\x00') openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) 04:06:10 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r0, r1) [ 504.931676][T10603] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 505.068031][ T5348] EXT4-fs (loop5): unmounting filesystem. 04:06:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b", 0x2a}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:10 executing program 1: r0 = fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 04:06:10 executing program 2: r0 = fsopen(&(0x7f00000000c0)='xfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x4, &(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='\x00', 0xffffffffffffff9c) 04:06:11 executing program 3: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f0000000000)='2\x00', 0x1) 04:06:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(&(0x7f0000000080)='./file0\x00', 0x4f6102, 0x0) 04:06:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41", 0x39}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:11 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) 04:06:11 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12040, 0x0) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0xffffffffffffffff, 0x0) [ 505.280253][T10607] syz-executor.3 (10607): drop_caches: 2 04:06:11 executing program 1: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) read$proc_mixer(r0, 0x0, 0x0) 04:06:11 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) [ 505.410732][T10639] loop5: detected capacity change from 0 to 512 04:06:11 executing program 1: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0) 04:06:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') read$ptp(r0, &(0x7f0000000100)=""/23, 0x17) [ 505.673572][T10639] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 04:06:11 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000001240), &(0x7f0000001280)={0x9}, 0x0, 0x0, 0x0) 04:06:11 executing program 1: r0 = fsopen(&(0x7f0000000000)='squashfs\x00', 0x0) read$FUSE(r0, 0x0, 0x0) 04:06:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada", 0x31}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 506.379767][ T5348] EXT4-fs (loop5): unmounting filesystem. [ 506.388773][T10640] syz-executor.3 (10640): drop_caches: 2 04:06:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000002200)='loginuid\x00') read$proc_mixer(r0, &(0x7f0000000040)=""/110, 0x6e) 04:06:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(&(0x7f0000000080)='./file0\x00', 0x4f6102, 0x0) 04:06:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147", 0x42}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) 04:06:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='wchan\x00') read$ptp(r0, &(0x7f0000000000)=""/1, 0x1) 04:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) sendfile(r0, r1, 0x0, 0xe) 04:06:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_targets\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) read$proc_mixer(r0, &(0x7f0000000040)=""/110, 0x6e) [ 506.562066][T10665] loop5: detected capacity change from 0 to 512 04:06:12 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000005800), 0x2, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 506.672290][T10665] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 04:06:12 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x40041, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000041c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}}, 0xa0) 04:06:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') read$ptp(r0, &(0x7f0000000180)=""/183, 0xb7) 04:06:12 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x8081, 0x0) pwritev2(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)="87", 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000030c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee01}}}}, 0xa0) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 506.919082][ T5348] EXT4-fs (loop5): unmounting filesystem. 04:06:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada", 0x31}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:12 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x281, 0x0) pselect6(0x40, &(0x7f0000001240), &(0x7f0000001280)={0x9}, 0x0, 0x0, 0x0) 04:06:12 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x4f6102, 0x0) 04:06:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147", 0x42}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') read$ptp(r0, &(0x7f0000000040)=""/188, 0xbc) 04:06:13 executing program 3: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) 04:06:13 executing program 2: fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) 04:06:13 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x4f6102, 0x0) 04:06:13 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x8081, 0x0) pwritev2(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)="87", 0x1}], 0x1, 0x0, 0x0, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000005240)='./file0\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 04:06:13 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000005800), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x36, 0x5, 0x0, {0x0, 0xfe88, 0x0, '/proc/self/net/pfkey\x00'}}, 0x36) 04:06:13 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000078c0), 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000500)={0x40000004}) 04:06:13 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x4f6102, 0x0) 04:06:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) 04:06:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(0x0, 0x4f6102, 0x0) 04:06:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada", 0x31}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 508.039389][T10710] loop5: detected capacity change from 0 to 512 [ 508.069797][T10710] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 508.110183][ T5348] EXT4-fs (loop5): unmounting filesystem. 04:06:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147", 0x42}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:14 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 04:06:14 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) 04:06:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') read$ptp(r0, &(0x7f0000000140)=""/1, 0x1) 04:06:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(0x0, 0x4f6102, 0x0) 04:06:14 executing program 2: open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x42, 0x0) 04:06:14 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000080)={0x8}, 0x0, 0x0, 0x0) 04:06:14 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x145) syz_open_procfs(0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x8081, 0x0) pwritev2(r0, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000240)='h', 0x1}, {&(0x7f0000000280)}, {0x0}], 0x5, 0x0, 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_dsack\x00', 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000031c0)={{0x1, 0x1, 0x18}, './file0\x00'}) lstat(0x0, &(0x7f00000051c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000001080)={0x2020}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000030c0)={0xa0, 0x0, 0x0, {{0x0, 0x3, 0x0, 0x0, 0x0, 0x401, {0x0, 0x3f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0xc000, 0x100, 0xffffffffffffffff, 0xee01, 0x101}}}}, 0xa0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) [ 508.368903][T10724] loop5: detected capacity change from 0 to 512 04:06:14 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12040, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@release_agent={'release_agent', 0x3d, './file0'}}, {@name={'name', 0x3d, '-[*'}}]}) [ 508.428198][T10724] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 04:06:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(0x0, 0x4f6102, 0x0) 04:06:14 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x145) syz_open_procfs(0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x8081, 0x0) pwritev2(r0, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000240)='h', 0x1}, {&(0x7f0000000280)}, {0x0}], 0x5, 0x0, 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_dsack\x00', 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000031c0)={{0x1, 0x1, 0x18}, './file0\x00'}) lstat(0x0, &(0x7f00000051c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000001080)={0x2020}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000030c0)={0xa0, 0x0, 0x0, {{0x0, 0x3, 0x0, 0x0, 0x0, 0x401, {0x0, 0x3f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0xc000, 0x100, 0xffffffffffffffff, 0xee01, 0x101}}}}, 0xa0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) [ 508.494514][ T5348] EXT4-fs (loop5): unmounting filesystem. [ 508.564739][T10735] cgroup: Invalid name [ 508.608704][T10738] loop5: detected capacity change from 0 to 512 [ 508.656923][T10738] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 508.714983][ T5348] EXT4-fs (loop5): unmounting filesystem. 04:06:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b", 0x34}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2", 0x47}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') read$ptp(r0, &(0x7f0000000180)=""/183, 0x7ffff000) 04:06:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') writev(r0, &(0x7f0000001380)=[{&(0x7f00000001c0)="ed", 0x1}], 0x300) 04:06:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$eJzs3E1rHGUcAPD/TN5sWt0VBEUvAQ+NSPNWRQOCevGkUtCD12XzQnXbSLKibfdQURA8CIJevHn3G3ioB7+AF7+AFykWzaURL5HZndluXiYmza7bpL8fPOzzzEue578zGf4zu/sE8NCaiojXImIkIhYiopIvT/MSNzsl225rs1X/e7NVT2J7+50/k0gi4u5mq178rSR/PZs3ptOI9POIZ27u7Xfj2vUPao3G8nrenm1e+XB249r1C5ev1FaXV5evXnxp7uWFxYXF+bm+xbo6Uh3fuvH2Z18tfnvryQv/TGfjPZev642jX6Ziqvue7PZivzsbsvFhDwAAgENJ89x/tJ3/V2KkXeuoxGxrqIMDAAAA+mL71fwVAAAAOMUS9/4AAABwyhXfA7i72aoXZYhfR/jf3Xk9Iqqd+Lfy0lkzGo/k24wN8PetUxFx6cbX72clBvQ7ZACAXj9l+c/cfvlfGk/1bDcR0c6HzvS5/6ld7b35T3q7z13ukOV/r+Rz2+zM/9Jik+pI3nq0nSqOJSuXG8tzEfFYREzH2ETWnj+gj+obv/xVtq43/8tK1n+RC+bjuD06sXOfpVqzdpyYe935NOLp0f3iT7r5bxIRk909yma0KTf/x3u3ytb9d/yDtf19xPl9j/+9OJOD5yeabZ8Ps8VZsdePl77cKOt/2PFnx3/y4PirSe98TaWRlHvruS9Wytbd7/k/nrzbrhf3ZZ/Ums31+Yjx5M29yxfu7Vu0i+2z+Kef3f//v7j+JfmcVufya8BRnf/u1x/uP/7ByuJfOtLxP3plcv23n8v6P9zxf6Fdm86XHOb6d9gBHue9AwAAgJMibT/XSNKZbj1NZ2Y6zzueiMm0sbbRfH5l7aOrS53nH9UYS4snXZWe56HznY/Ru+2FXe2LEfF4RHxTOdNuz9TXGkvDDh4AAAAeEmdL7v8zv1eGPToAAACgb6rDHgAAAAAwcO7/AQAA4FQ7zrx+KioPXOXjB2MYJ78y7CsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAyfZvAAAA//+btdL/") open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 04:06:15 executing program 1: name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', &(0x7f0000000200)=@reiserfs_5={0x14}, 0x0, 0x0) [ 509.258029][T10747] loop5: detected capacity change from 0 to 512 04:06:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') read$ptp(r0, &(0x7f0000000180)=""/183, 0x7ffff000) 04:06:15 executing program 3: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000000)=[{' ', './file0'}], 0x1) 04:06:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 509.301811][T10747] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 04:06:15 executing program 3: lstat(&(0x7f00000041c0)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 04:06:15 executing program 2: r0 = fsopen(&(0x7f0000000000)='squashfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) read$FUSE(r0, 0x0, 0x0) [ 509.375708][ T5348] EXT4-fs (loop5): unmounting filesystem. 04:06:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') read$ptp(r0, &(0x7f0000000180)=""/183, 0xb7) [ 509.485091][T10760] loop5: detected capacity change from 0 to 512 [ 509.569437][T10760] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 509.638086][ T5348] EXT4-fs (loop5): unmounting filesystem. 04:06:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b", 0x34}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2", 0x47}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:15 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12040, 0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340), 0x0, &(0x7f0000000080)={[{@name={'name', 0x3d, 'cgroup\x00'}}]}) 04:06:15 executing program 3: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x8) 04:06:15 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup2(r0, r1) 04:06:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)={[{@grpquota}, {@block_validity}]}, 0x1, 0x3cf, &(0x7f00000008c0)="$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") open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 04:06:16 executing program 3: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x8) [ 510.181062][T10777] loop5: detected capacity change from 0 to 512 [ 510.187831][T10778] cgroup: No subsys list or none specified 04:06:16 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)="b10d036c") 04:06:16 executing program 3: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x8) [ 510.235938][T10784] debugfs: Directory '01777777' with parent 'damon' already present! [ 510.253503][T10777] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 04:06:16 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsync(r0) 04:06:16 executing program 2: open$dir(&(0x7f0000000240)='./file0\x00', 0x42, 0x408) 04:06:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') r1 = fcntl$dupfd(r0, 0x0, r0) read$snapshot(r1, &(0x7f00000001c0)=""/68, 0x44) [ 510.304719][ T5348] EXT4-fs (loop5): unmounting filesystem. [ 510.391028][T10792] debugfs: Directory '01777777' with parent 'damon' already present! 04:06:16 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12040, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000002900)='./file0\x00', 0x200) 04:06:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2", 0x47}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:16 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x40040, 0x0) read$FUSE(r0, 0x0, 0xeffd) 04:06:16 executing program 1: r0 = syz_io_uring_setup(0x6574, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_uring_enter(r0, 0x3b28, 0x0, 0x0, &(0x7f0000000000)={[0x1102]}, 0x8) 04:06:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b", 0x34}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:16 executing program 3: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x8) 04:06:16 executing program 5: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$damon_contexts(r0, &(0x7f0000000000)=[{' ', './file0'}, {' ', './file0'}, {' ', './file0'}], 0x3) 04:06:16 executing program 5: r0 = fsopen(&(0x7f0000000080)='gfs2\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000000c0)='/-\'.\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c) 04:06:16 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) dup2(r1, r0) [ 511.138729][T10806] debugfs: Directory '01777777' with parent 'damon' already present! 04:06:17 executing program 3: mq_open(&(0x7f0000000040)='\xb9\x90\x81\xafV\xda*\x80\x00\xec\xff', 0x41, 0x0, 0x0) 04:06:17 executing program 5: setreuid(0x0, 0xee01) openat$zero(0xffffffffffffff9c, &(0x7f00000024c0), 0x0, 0x0) 04:06:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) 04:06:17 executing program 3: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r0, r1) 04:06:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d", 0x49}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:17 executing program 2: renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0xffffffffffffffff, 0x0) 04:06:17 executing program 5: name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000140)='\x00', &(0x7f0000000200)=@OVL_FILEID_V1={0x81, 0xf8, {'\x00', {0x0, 0xfb, 0x7e, 0x0, 0x0, "64a86e21e1f67d585a76fcdade1bde5c", "e90f886381bd73bca89fbb7ff5f0a21e20b655c471bb7a60ab5cdb1df257bb515ca5a2131a404d3510532694d4f38550c6d97ef8a111b860893060119afa52cab97612c7fe9ea78c728aa6ed45117c362a51f4cc83f91ceabe254de2ef1036fbf793086defd43c6b68"}}}, 0x0, 0x1000) 04:06:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) 04:06:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') fcntl$getown(r0, 0x9) 04:06:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d1", 0x36}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:17 executing program 3: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 04:06:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 04:06:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') write$FUSE_BMAP(r0, 0x0, 0x0) 04:06:17 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x0) 04:06:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') openat$cgroup_type(r0, &(0x7f0000001800), 0x2, 0x0) 04:06:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') openat$cgroup_freezer_state(r0, &(0x7f0000000100), 0x2, 0x0) 04:06:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d", 0x49}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:18 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_GETXATTR(r0, &(0x7f00000000c0)={0x18}, 0xffffffffffffffa1) 04:06:18 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 04:06:18 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 04:06:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x161, 0x0) 04:06:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d1", 0x36}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 04:06:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'bridge_slave_0\x00', {0x2, 0x0, @remote}}) 04:06:18 executing program 5: shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) 04:06:18 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 04:06:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x161, &(0x7f0000000ac0)={0x0, 0x989680}) 04:06:18 executing program 1: semget$private(0x0, 0x4, 0xac) 04:06:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d", 0x49}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000880)={'ip6tnl0\x00', &(0x7f00000007c0)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private0, @remote}}) 04:06:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) 04:06:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan1\x00'}) 04:06:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000004040)={0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000000580)=ANY=[@ANYBLOB="d2879b91bb4f78a033bf64d85711bb00000000df3e4c5095d00600000049d1f217a5eabb82c301cb794e064bcd6bd92305d43a08e34b36ac2d9428f0d28ca5ad62a4a1be580190321529e4bd92f1bfd61b505000f18106000000905c53b4775826b9f9d55fdbf212f23e0153761c92bcfc31a913fe723aaf2e16c2f2b8545290f9b792fe6533395a6b6d77a191e627184a13bf243ec3dfd7d72be7444a00007e9515b264e5380863d393b0e89e84831a87e41fe79ba17f41d6aac0dbffffffffffffff8372ef912a3b4164e40b4dc961cf787c00000000fb9d2e9088d22e668b7f198a765d1df665822538a1e349160143a573303c10c55584e7693a6ea16dc507f2fe6c4b51e41eb4a4900326a3da5613734d1026867c8e47a1f70460689e18a9f441d07f65eb1fc6901e3f0837a93df2478e2bb2808178898e4cb775e6b2d1159aacbe155b5768a9dccee503198d521c0653ab1c05b6403a79dd8dcfe330a4b15a2ec57c548a72b818ab783b0c087a840b2df9b1c4ac49cf2b0b3eb4ca5edf390731309439cf36e41ed324a1b04f51c4c109c40566cb78bfa6546845897af9b61b6c982079497b4498b05c2a4bdf06a18c3314104ad053095e08c0d86ac972d5e99d1bd18ee7cdba99ef40d4593798c437be8bd3ce97eff0330146d99d2538d11aeee37d0ba1212c75a4ce1dd5be1d14e26887e01453ba508332b5de54cd16eb063586dfaf70d811e45efebc3f000000331e5cbc43850bd96c25fa07044415c70a136f471d616a6a4a6df685dde3b10a73a5"], 0x10}], 0x10000000000002a5, &(0x7f0000003f40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x500020}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000004040)={0x0, 0x34, &(0x7f0000003a80), 0x943e3d6e320f824, &(0x7f0000000540)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff}}}], 0x500020}, 0x0) syz_open_procfs(0x0, 0x0) 04:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d1", 0x36}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:19 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'security.', 'com.apple.system.Security\x00'}) 04:06:19 executing program 3: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 04:06:19 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[], 0x0) 04:06:19 executing program 1: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') 04:06:19 executing program 3: fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000008c0)) 04:06:19 executing program 5: renameat(0xffffffffffffffff, &(0x7f0000000600)='./file0/../file0\x00', 0xffffffffffffffff, 0x0) [ 514.252478][ T6627] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 514.442421][ T6627] usb 3-1: device descriptor read/64, error 18 04:06:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d44", 0x4a}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:20 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$dupfd(r0, 0xc, 0xffffffffffffff9c) 04:06:20 executing program 5: msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 04:06:20 executing program 3: renameat(0xffffffffffffffff, &(0x7f0000000600)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00') [ 514.712425][ T6627] usb 3-1: new high-speed USB device number 3 using dummy_hcd 04:06:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) 04:06:20 executing program 1: lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) lchown(&(0x7f0000000200)='.\x00', 0x0, 0x0) 04:06:20 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) dup(0xffffffffffffffff) [ 514.922567][ T6627] usb 3-1: device descriptor read/64, error 18 [ 515.046447][ T6627] usb usb3-port1: attempt power cycle [ 515.212420][ T6313] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 515.412622][ T6313] usb 4-1: device descriptor read/64, error 18 [ 515.462441][ T6627] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 515.632528][ T6627] usb 3-1: device descriptor read/8, error -61 [ 515.702581][ T6313] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 515.902498][ T6627] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 515.942488][ T6313] usb 4-1: device descriptor read/64, error 18 [ 516.072607][ T6313] usb usb4-port1: attempt power cycle [ 516.072704][ T6627] usb 3-1: device descriptor read/8, error -61 [ 516.202588][ T6627] usb usb3-port1: unable to enumerate USB device [ 516.492421][ T6313] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 516.592920][ T6313] usb 4-1: Invalid ep0 maxpacket: 0 [ 516.742695][ T6313] usb 4-1: new high-speed USB device number 10 using dummy_hcd [ 516.832550][ T6313] usb 4-1: Invalid ep0 maxpacket: 0 [ 516.844015][ T6313] usb usb4-port1: unable to enumerate USB device 04:06:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 04:06:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0xa, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000006c0), 0x10, 0x42, 0x0) 04:06:22 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 04:06:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d44", 0x4a}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:22 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0xffffff8f, 0x0, 0x0) 04:06:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 04:06:22 executing program 2: lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x1, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') 04:06:22 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:23 executing program 2: getsockname$unix(0xffffffffffffff9c, 0x0, 0x0) 04:06:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f00000001c0)={0xf8, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xe7, 0x0, 0x0, 0x1, [@generic="0177f28f29b6245ea443fd3daa030fcf208a92a3c57dc991aa87f54bebd1bf4d99d803cdb50eff8bcfd837cc0f57cd00fc0a9c5c5708602efd0c328b95b87355b6c2570f8508fa9fae827028a3de19aa2c82a21ef8a556a94d1503c6d9b904ae59d7c8a3233def1e0c12278c6814e2958638f83f87e91ea88c6d508d5d6a33f460d8201d463ac176c692307e6f5153b9cdc09d07c55cef0a1f6ae38ea7d483e3c2f6c3e9ae8564b2b7e5ad7a3e6c6a9c02fb2761cc3802e81420332a37631b55218603f1dfcb96", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0xf8}, {&(0x7f00000002c0)={0x284, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@local}, @nested={0x1c1, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@local}, @generic="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", @typed={0x21, 0x0, 0x0, 0x0, @binary="ef940ff6764b72c37e3f9647232c353fa1f35f306dbbefa572d2320d08"}, @typed={0x61, 0x0, 0x0, 0x0, @binary="0edef0556627ba9c4765df33886fe3805a20ee890d0f0f720e4ab18ba35f5ea88b67f1f3e9f4b597954b47db5b788c3db4f07fcd08e4b68019ceddca436cc9662b39d01264296b3a0bee68020fd3fce6b8bfe5b1b29b0a78d305518369"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}, @generic="915d6d619e20812549c1f1a18fa3b8cfe5ab8795dbb57f54adcf70e12a9966"]}, @nested={0x45, 0x0, 0x0, 0x1, [@generic="1cf181a3509877fda97be25b4fa1174a5295fd7d986e17cb14eaf4c0f0c74500919c710cd3d2cfa99de5376b76932f25d5284d11539f342db2", @typed={0x8, 0x0, 0x0, 0x0, @u32}]}, @generic="4793c66f4feeda0169285d4ec5b7106e298f8513522dbe17856071dd21e2719d7b2450bbb622028d70445baade15a0cdda6109a685dc03a3e562c8a8993ea93465cf9d8177ed3c84793d76a8dc66ed2f400f104986"]}, 0x284}, {&(0x7f0000000580)={0x1d8, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc1, 0x0, 0x0, 0x1, [@generic="95d62f2b3f45aa9a1ed41381b9e605ca0b0c0407b1beba5db96d84c5d7200c893aee85df193bf2ce14d02c7dfec0b28fcc0482286135", @generic="7fd5a32fdd31d6d8f38b54ff6fcfce33829d383e806c099b23b059445a1324e8dfd5f5202e544e9e8c2627b9dbbe6ae7b6e7be094bcba64a63e1af8b7d7ba871f19e0b92c642813e9fd9f2e36c745b3fbcdceb92a7dec7cdb48580a2da0f4d326b8bdf17d0faf870c85a1320cd829b9b96521801ad93abfdaccb5ad218b3c3644a3eed0b16184c"]}, @nested={0x101, 0x0, 0x0, 0x1, [@generic="55740f54a9fa44f132763a484c2006a40102241a50b0ff97a57b3f3c773ebcde65dbe4fb6a8a3704754123975c11e291e4efb8840e99115212286c53df0f9461e47d7132a7b87cf99b1aecdcf7383a00d3a7d55071d017e9f42eccd2ae31112cfaf23cfe58dcfff3b1b4c583c7887693b7e14f6d133b252d6cce52782cff7cb12f3bb4e39fa42be70fb55314fba59f1f8c8bc06c724ae5eab7dcb7c5817db6090acdf339f5989b0557d08ca5a54595c1854ac9318af46ec79386ad0e8f8c3516daf93c4954d53ebb15728a0e72e90f3f4ddf98c8707563cad69233fc285024a4cdc71965404a8c4315cac16c7a", @typed={0x7, 0x0, 0x0, 0x0, @str='^%\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @u32}]}]}, 0x1d8}, {&(0x7f0000000880)={0x284, 0x0, 0x0, 0x0, 0x0, "", [@generic="7b601f20393829eb449a8a749587b17e731abbc1abfd137563ff66f55e6f2b31ba7043f653ca267849111d2ecfeffa97a3d4c97d50f246310ede6dede4b60230528d3b00c7f24a22b4c197908bd6d9e55ca6d6b9ac75f898b246066ae022e54ec606e4c8d5cde1aa692a9990c71e300543a425617d9ca18a4044f853d252308a691a28fc0aa366f7258d89cdf192c0a02250125b513e6dbd0cefcd859048c4a40dee9810c24df35519db708ff20dca8987b3b668291d56a5724359ed411f1c09f62bccb27f75c531b94b96c1daeb3ed6aa7b05055f122f755d522c7446b14343bf7808f11c8cfd307d786b4a45a00abbb19fba0d1c0a29b642", @nested={0x175, 0x0, 0x0, 0x1, [@typed={0x4}, @generic="4e42376a227090b9ae8199158457ba1a1503cad80fbb9e59b41c6431ab8c4373d0cb794c35377e80ef913d1f1306f48faf2497e9c368586fee07a694b1d25cd8d5db07a379", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}, @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}]}]}, 0x284}, {&(0x7f0000000b40)={0xac, 0x39, 0x62d, 0x0, 0x0, "", [@typed={0x99, 0x0, 0x0, 0x0, @binary="725910b1ad6f2fa668a37bfd2a4b1224c2305ac8fb839802a7c751d23c70cb0a01d83db0fc45699fc36f5e5a2f8afbba1bba5bb2009e27d3be50c88d6df802c9e450997a77a66e5a78d49cb5853762497b7f73eabd723561368db4e60a99a80d430c0bdb679b1c2ec41d73e96d1ba6594a2682cd90683c6436fc324d3ca9c95dd596c858b547259f3eb737389e411b3488552fb86a"}]}, 0xac}, {&(0x7f0000000c00)={0x15c, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0xa9, 0x0, 0x0, 0x0, @binary="018d9c03f3bd3a52b181f288b6c3d9c27f873e08d545700f1f9189fb0d63ed026aa9e7b8aa4a59949cb0ca96b495dd28f7d6dd3a098a40adbef7a1cf220847e48d906d8df2786a54b07f9bbe51803dec0451bd96cd42884907e4389feab64bb70ca9fe6a8be2758a0d2e80c515f8999f1b77c1a88e40aee4a50618282db5387eed9929ce302239bfc93f061d4bec4d5401428d5f4f89440487310f2cbee06735ef3e78354b"}, @generic="9bf2ece431acd4c02ca90d3d322b0c3b00988b472b768504a7678a4ded97dbea1560c2d3970bfd74b0cf5b046c45268f5d17490a95b57887", @generic="a20ad86cec0b4a48183940a9a6b99118c620846b93eab5dbde21d3be8f6a745056ef9c552aa680905264bdbeb044c4c4955f20fd4806423e2bc628dc7426b1642e9cdf8f76ed4e295259c660ffa6964e9a1ae03b53df6191b2b40a77ee"]}, 0x15c}, {&(0x7f0000000d80)={0x58, 0x0, 0x0, 0x0, 0x0, "", [@generic="2ad3a9c09975891a586148f7379065c42380129e43eb098241afd1772d918c4ba69b748d6463c227928e9f4799fdd68add3bc76a512f6fae7daec93d11f851310c56596d7f"]}, 0x58}, {&(0x7f0000001f80)={0x48c, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x4, 0x0, 0x0, 0x0, @binary}, @typed={0x10, 0x0, 0x0, 0x0, @str='/dev/rfkill\x00'}, @generic="9264956e9b07d012e31ec714f86dc1145d478a71a67a8905b40ab3088e273b9745db08e6811d28f6a37b76f7a7599a6a410e560a37e9bf7a4ef5b2b960d6524fa78b9b57a4c304bbb3708490cf55642b46a4f7355c9fcc583689dc24e96897a885d816455696de73d4394c0e123357bbfa5f42930322c3a5b8022366bc5da5cdfc638c84014801", @generic="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"]}, 0x48c}], 0x8}, 0x0) [ 517.282809][ T6536] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 517.503449][ T6536] usb 6-1: device descriptor read/64, error 18 [ 517.792852][ T6536] usb 6-1: new high-speed USB device number 3 using dummy_hcd 04:06:23 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) 04:06:23 executing program 2: openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x5cd540, 0x0) 04:06:23 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 517.992842][ T6536] usb 6-1: device descriptor read/64, error 18 [ 518.112668][ T6536] usb usb6-port1: attempt power cycle [ 518.522452][ T6536] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 518.623299][ T6536] usb 6-1: Invalid ep0 maxpacket: 0 [ 518.772496][ T6536] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 518.864326][ T6536] usb 6-1: Invalid ep0 maxpacket: 0 [ 518.870046][ T6536] usb usb6-port1: unable to enumerate USB device 04:06:25 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x1) 04:06:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d44", 0x4a}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000003c0)={&(0x7f0000000200), 0xffffffffffffff98, &(0x7f0000000300)={&(0x7f0000000280)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x58}}, 0x0) 04:06:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0xa012}, 0xc, &(0x7f0000000940)={0x0}}, 0x0) 04:06:25 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000240)) 04:06:25 executing program 1: socket$igmp6(0xa, 0x3, 0x2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) socket$caif_stream(0x25, 0x1, 0x0) 04:06:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0xf) 04:06:25 executing program 2: syz_open_dev$vcsn(&(0x7f0000000200), 0x200, 0x0) 04:06:25 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000740)) 04:06:26 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 04:06:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x415}, 0x14}}, 0x0) 04:06:26 executing program 1: syz_clone(0x88ea000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:26 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x42001, 0x0) syz_clone(0x4004400, 0x0, 0x0, 0x0, 0x0, 0x0) getuid() getpgrp(0x0) getgroups(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000002080), 0x0, 0x0, 0x0, 0x0) 04:06:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{0x0}, {0x0}, {&(0x7f0000000580)={0x10}, 0x10}], 0x3}, 0x0) 04:06:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x415}, 0x14}}, 0x0) 04:06:26 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000), 0xf5da, 0x84003) 04:06:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {0x0}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000800)={'batadv_slave_0\x00'}) 04:06:26 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000300), 0x4) 04:06:26 executing program 1: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000006900), 0xffffffffffffffff) syz_clone(0x6000080, 0x0, 0x0, &(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)="37f6e8371a5166b0881dc9eec6c15ff38e87c2f6355098b88467303b48dbbedeeaefa9205da8380e9f29502cd149abd054c412981f3da9b8487382463172e69de485915e6c6471ebf7c2f90677d56050edcf70d4862a39ad19feca598ff6d420f08da249da970181f823eae23e21c19fc9b42a2d06d3ff14c18924f96b1baea25d6da76393007cabc9068a4724c2513e1a7b7afe46dd6471dac82b5e68c508ffc532eb8af5754c755daadadf3f966a893183100d2e7d21566044963b81f881ea6892cdd4d2caa7da00c2e1578699a3ccb085651b53711fb1c46ecf8540ba4b27c18c54adc6") r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f000000d300)={'ip6_vti0\x00', &(0x7f000000d280)={'ip6tnl0\x00', 0x0, 0x0, 0x61, 0x3, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x7800, 0x2, 0x3}}) socket$inet6_udp(0xa, 0x2, 0x0) 04:06:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 04:06:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0xa012}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) 04:06:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{0x0}, {0x0}, {&(0x7f0000000b40)={0x10}, 0x10}], 0x3}, 0x0) 04:06:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:27 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000090000000a20000000000a05140000000000000000010000000900010073797a300000000058000000160a03000900000000000000010000000900010073797a30000000000900020073797a32000000002c0003"], 0xa0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000090000000a20000000000a05140000000000000000010000000900010073797a30a4914d8558000000160a03000900000000000000010000000900010073797a30000000000900020073bb"], 0xa0}}, 0x0) 04:06:27 executing program 2: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x575e01, 0x0) 04:06:27 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x42001, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x6, 0x3}, 0x8) 04:06:27 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 04:06:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {0x0}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:27 executing program 2: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:06:27 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000), 0x6f, 0x4040) 04:06:27 executing program 3: syz_open_dev$vcsn(&(0x7f0000002b80), 0x2, 0x0) 04:06:27 executing program 5: getgroups(0x1, &(0x7f0000006200)=[0xee01]) 04:06:27 executing program 2: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f000000d240)=@unspec, 0xc) 04:06:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000000b40)={0x10, 0x39, 0x62d}, 0x10}], 0x1}, 0x0) 04:06:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:28 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:06:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x15, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_OBJ_USERDATA={0x4}]}, 0x18}}, 0x0) 04:06:28 executing program 5: setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, 0x0, 0x0) 04:06:28 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000d40)={0x0}}, 0xc0) syz_genetlink_get_family_id$batadv(&(0x7f0000000f00), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001480)={'syztnl2\x00', &(0x7f0000001400)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 04:06:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {0x0}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'erspan0\x00', 0x0}) 04:06:28 executing program 2: syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x200) 04:06:28 executing program 3: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x4000) 04:06:28 executing program 5: syz_clone(0x88ea000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='0') 04:06:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005e00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 04:06:28 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r0, 0x0, 0xcf, 0x0, &(0x7f0000000280)) 04:06:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {0x0}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:29 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) 04:06:29 executing program 2: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) 04:06:29 executing program 5: syz_clone(0x88ea000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='0') 04:06:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000b40)) 04:06:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:29 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000003180)={0x0, 0x0, 0x20}, 0x10) 04:06:29 executing program 1: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000340), 0x101000, 0x0) 04:06:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00)=[@cred={{0x1c}}], 0x20}, 0x0) 04:06:29 executing program 3: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000006900), 0xffffffffffffffff) syz_clone(0x6000080, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f00000001c0)={0xf8, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xe5, 0x0, 0x0, 0x1, [@generic="0177f28f29b6245ea443fd3daa030fcf208a92a3c57dc991aa87f54bebd1bf4d99d803cdb50eff8bcfd837cc0f57cd00fc0a9c5c5708602efd0c328b95b87355b6c2570f8508fa9fae827028a3de19aa2c82a21ef8a556a94d1503c6d9b904ae59d7c8a3233def1e0c12278c6814e2958638f83f87e91ea88c6d508d5d6a33f460d8201d463ac176c692307e6f5153b9cdc09d07c55cef0a1f6ae38ea7d483e3c2f6c3e9ae8564b2b7e5ad7a3e6c6a9c02fb2761cc3802e81420332a37631b55218603f1df", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0xf8}, {&(0x7f00000002c0)={0x284, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@local}, @nested={0x1c1, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@local}, @generic="5cd3515f4386b93c40a74bc040b03808353011e00ced00c2b75c99e54a898ef77ba82f5c1cfe25bf9b7f71bb6d95c1a58492a5a7d6576de1ca6650bde78fc55adb5db7ff35987380aacf8f03753deac2d8ca4f4f315a6fa6942c60278898686cec83e167fcc9bc2acaccf6f17584f35f38058b6b6b81edea37c6d80f022b03564adea9948d66d03f66f76713ecb033875a135656f4ec72e3e086edebea6e8c02b5988d30701f63f81890f48f91e341cbb9567e1cf586fe7022b89833237e95f6c4ad81d8887a788091fa1b5c9afcb2402c8ac39e7ac01b2c3fe25c01ed867f39ed1631b4ff0ee3090e3d1960c08ccee14247c0f30e6b153b2475", @typed={0x21, 0x0, 0x0, 0x0, @binary="ef940ff6764b72c37e3f9647232c353fa1f35f306dbbefa572d2320d08"}, @typed={0x61, 0x0, 0x0, 0x0, @binary="0edef0556627ba9c4765df33886fe3805a20ee890d0f0f720e4ab18ba35f5ea88b67f1f3e9f4b597954b47db5b788c3db4f07fcd08e4b68019ceddca436cc9662b39d01264296b3a0bee68020fd3fce6b8bfe5b1b29b0a78d305518369"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}, @generic="915d6d619e20812549c1f1a18fa3b8cfe5ab8795dbb57f54adcf70e12a9966"]}, @nested={0x45, 0x0, 0x0, 0x1, [@generic="1cf181a3509877fda97be25b4fa1174a5295fd7d986e17cb14eaf4c0f0c74500919c710cd3d2cfa99de5376b76932f25d5284d11539f342db2", @typed={0x8, 0x0, 0x0, 0x0, @u32}]}, @generic="4793c66f4feeda0169285d4ec5b7106e298f8513522dbe17856071dd21e2719d7b2450bbb622028d70445baade15a0cdda6109a685dc03a3e562c8a8993ea93465cf9d8177ed3c84793d76a8dc66ed2f400f104986"]}, 0x284}, {&(0x7f0000000580)={0x1d8, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc1, 0x0, 0x0, 0x1, [@generic="95d62f2b3f45aa9a1ed41381b9e605ca0b0c0407b1beba5db96d84c5d7200c893aee85df193bf2ce14d02c7dfec0b28fcc0482286135", @generic="7fd5a32fdd31d6d8f38b54ff6fcfce33829d383e806c099b23b059445a1324e8dfd5f5202e544e9e8c2627b9dbbe6ae7b6e7be094bcba64a63e1af8b7d7ba871f19e0b92c642813e9fd9f2e36c745b3fbcdceb92a7dec7cdb48580a2da0f4d326b8bdf17d0faf870c85a1320cd829b9b96521801ad93abfdaccb5ad218b3c3644a3eed0b16184c"]}, @nested={0x101, 0x0, 0x0, 0x1, [@generic="55740f54a9fa44f132763a484c2006a40102241a50b0ff97a57b3f3c773ebcde65dbe4fb6a8a3704754123975c11e291e4efb8840e99115212286c53df0f9461e47d7132a7b87cf99b1aecdcf7383a00d3a7d55071d017e9f42eccd2ae31112cfaf23cfe58dcfff3b1b4c583c7887693b7e14f6d133b252d6cce52782cff7cb12f3bb4e39fa42be70fb55314fba59f1f8c8bc06c724ae5eab7dcb7c5817db6090acdf339f5989b0557d08ca5a54595c1854ac9318af46ec79386ad0e8f8c3516daf93c4954d53ebb15728a0e72e90f3f4ddf98c8707563cad69233fc285024a4cdc71965404a8c4315cac16c7a", @typed={0x7, 0x0, 0x0, 0x0, @str='^%\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @u32}]}]}, 0x1d8}, {&(0x7f0000000880)={0x284, 0x0, 0x0, 0x0, 0x0, "", [@generic="7b601f20393829eb449a8a749587b17e731abbc1abfd137563ff66f55e6f2b31ba7043f653ca267849111d2ecfeffa97a3d4c97d50f246310ede6dede4b60230528d3b00c7f24a22b4c197908bd6d9e55ca6d6b9ac75f898b246066ae022e54ec606e4c8d5cde1aa692a9990c71e300543a425617d9ca18a4044f853d252308a691a28fc0aa366f7258d89cdf192c0a02250125b513e6dbd0cefcd859048c4a40dee9810c24df35519db708ff20dca8987b3b668291d56a5724359ed411f1c09f62bccb27f75c531b94b96c1daeb3ed6aa7b05055f122f755d522c7446b14343bf7808f11c8cfd307d786b4a45a00abbb19fba0d1c0a29b642", @nested={0x175, 0x0, 0x0, 0x1, [@typed={0x4}, @generic="4e42376a227090b9ae8199158457ba1a1503cad80fbb9e59b41c6431ab8c4373d0cb794c35377e80ef913d1f1306f48faf2497e9c368586fee07a694b1d25cd8d5db07a379", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}, @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}]}]}, 0x284}, {&(0x7f0000000b40)={0xac, 0x39, 0x62d, 0x0, 0x0, "", [@typed={0x99, 0x0, 0x0, 0x0, @binary="725910b1ad6f2fa668a37bfd2a4b1224c2305ac8fb839802a7c751d23c70cb0a01d83db0fc45699fc36f5e5a2f8afbba1bba5bb2009e27d3be50c88d6df802c9e450997a77a66e5a78d49cb5853762497b7f73eabd723561368db4e60a99a80d430c0bdb679b1c2ec41d73e96d1ba6594a2682cd90683c6436fc324d3ca9c95dd596c858b547259f3eb737389e411b3488552fb86a"}]}, 0xac}, {&(0x7f0000000c00)={0x15c, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0xa9, 0x0, 0x0, 0x0, @binary="018d9c03f3bd3a52b181f288b6c3d9c27f873e08d545700f1f9189fb0d63ed026aa9e7b8aa4a59949cb0ca96b495dd28f7d6dd3a098a40adbef7a1cf220847e48d906d8df2786a54b07f9bbe51803dec0451bd96cd42884907e4389feab64bb70ca9fe6a8be2758a0d2e80c515f8999f1b77c1a88e40aee4a50618282db5387eed9929ce302239bfc93f061d4bec4d5401428d5f4f89440487310f2cbee06735ef3e78354b"}, @generic="9bf2ece431acd4c02ca90d3d322b0c3b00988b472b768504a7678a4ded97dbea1560c2d3970bfd74b0cf5b046c45268f5d17490a95b57887", @generic="a20ad86cec0b4a48183940a9a6b99118c620846b93eab5dbde21d3be8f6a745056ef9c552aa680905264bdbeb044c4c4955f20fd4806423e2bc628dc7426b1642e9cdf8f76ed4e295259c660ffa6964e9a1ae03b53df6191b2b40a77ee"]}, 0x15c}, {&(0x7f0000000d80)={0x58, 0x3f, 0x0, 0x0, 0x0, "", [@generic="2ad3a9c09975891a586148f7379065c42380129e43eb098241afd1772d918c4ba69b748d6463c227928e9f4799fdd68add3bc76a512f6fae7daec93d11f851310c56596d7f"]}, 0x58}, {&(0x7f0000001f80)={0x48c, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x4, 0x0, 0x0, 0x0, @binary}, @typed={0x10, 0x0, 0x0, 0x0, @str='/dev/rfkill\x00'}, @generic="9264956e9b07d012e31ec714f86dc1145d478a71a67a8905b40ab3088e273b9745db08e6811d28f6a37b76f7a7599a6a410e560a37e9bf7a4ef5b2b960d6524fa78b9b57a4c304bbb3708490cf55642b46a4f7355c9fcc583689dc24e96897a885d816455696de73d4394c0e123357bbfa5f42930322c3a5b8022366bc5da5cdfc638c84014801", @generic="fa61d44ba952d8c9317a178c0c81b8d23a099e3d43b06caaa7b422fc2c3a12682a3b5cd786bcd16d5bb3ce6b600b53809a39f08ff958364380eee9720ac6a0147691d0b7212e50cdf5291f028d3bb396e50d631fe9c6ba76486a760a751d4eacc1a99ff0c068ff9ab2dd85d4e117f9ee178d19c87f0ea09ea14a948da667d4d6931665e32ce17a7f49c61b6fc7fdbbf05cfa4004a8c1ade98fb6e82b7f306d3f58a09f691150f708aea0f17f91d9c5fe80e23ccee8f8828a19ecbfb0704bcaad98bd91ccc25e99efa4d4974e69bd4ccc37a4143be84fe0218319081a2e37cc86e0cbc13e923e28152b7b031547223798ceab2e107c5dfe398a08bcdf96e9571d30c0454bd3921c26b6e64a6148a737d18414410f9e89b36a7be6858f7b2582a389b4848af4de21b073a18ea2132b346efa6b0a610e0b3be5ea3f6e9edff11f99aa6ee3b1286fe2509be237e0a99a2c6537f6a36ffa0d37d30ea4fb962f1fc8ff3d8181f1834d88e109d70abda473f3d989fc710a41f0d8ae1761a6c2e5d9692bfa6de6874777d781df14eace4c44535979ca727d3a6137882689abc8e2affe234d62bbd909e78c2ac5705dd557f2314d9e4243bc7c5eafd34af521baee3beccae739358d8e2063dde02e5cdcc41406de2aaeb1d75454c22e5e3fdc68604cdb14e02f11d55046976b932a939220e342808e6ff2fdd5d71931fbac982c0bea9ead8f7604c97bbd6c5543c2f17b5ae5df09d69196989a7a1db87d5aa94e1dfb18bc615369a63ae42eab9fd78551e7b1af5ec8721c1c3379b738f6ca376d15e765807d0d9f611d086a7d78ed62324397f342ff66cb887f25d26fd59d2b38822c8426c60b414dc1d3d6694e26300718e7f10209dbbec5a1eff72f962bd437f7b6db1e14e6d4f7c6135e3461e6cc06ce395a0364ebfcdfe07dbb5870c887f495ed58c9ea4a8194ac8b2e2cb2458c39049546e330b182a49fc45ed5953b7bd2f3a69ef2f73e3204247bf962b0cfc902d2e82903580101b49c2fbf042774bc024499eb99f58f91deb9ced40bf579aea3651b3c370f2134ba97fd2f26217b5612c28d229a202dd8044ecce0c7d1ed2c2a05d0e81e90cc44edc1fe488541037262c7249378c7685e59f6336ac18d15a8130b6ac74f60768e52f51b06b1c4a8f2b489b43790298ab1ae5a5b8fe2b3fadf7e8f4c80332cab1e1bbf1c42f58635cdf91c9ab5240345b29f1a9b4b88561fff73e0bafd083b081bdfd6753d524fd3b5ab2d9a8b7ab78d65b3a4c2a06bd025cde8632c25d6891e48e20302f84874cf84acf8edd20472479c244ec3ce573aa7a9318fc25290c08eb97ca1e35e3dd0addcbb58cc948364b2a306f128a567ad9ff91f45e77f28ef684974f4fd"]}, 0x48c}], 0x8}, 0x0) 04:06:29 executing program 5: syz_clone(0x88ea000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='0') 04:06:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {0x0}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:30 executing program 1: socket$igmp6(0xa, 0x3, 0x2) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) 04:06:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 04:06:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000100), &(0x7f0000000140)=0x8) 04:06:30 executing program 5: syz_clone(0x88ea000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='0') 04:06:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:30 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000280), &(0x7f0000000000)=0x98) 04:06:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x98) 04:06:30 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@broadcast, @random="2ad28e1cb28a", @val, {@ipv6}}, 0x0) 04:06:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x24, &(0x7f0000000280), &(0x7f0000000080)=0x98) 04:06:30 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000200)=@un=@abs={0x8}, 0x8) 04:06:30 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) 04:06:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {0x0}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:31 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket(0x2, 0x1, 0x0) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000040)=0x88) 04:06:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f00000000c0), &(0x7f0000000180)=0xb0) 04:06:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000003c0)=ANY=[], &(0x7f0000000000)=0x8) 04:06:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xfeff}, 0x8) 04:06:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000140)="e0", 0x1, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 04:06:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x24, &(0x7f0000000280), &(0x7f0000000080)=0x98) 04:06:31 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000100), &(0x7f0000000140)=0x8) 04:06:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xffffffffffffff6e, 0x2}, 0x10) listen(r0, 0xe9) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000001c0), 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0xfffffffffffffe55, 0x2}, 0x10) sendto(r1, &(0x7f00000000c0)="290ed4ed3a", 0x5, 0x0, 0x0, 0x0) 04:06:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r2 = dup(r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000700)={0x1, [0x0]}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000000c0)={r3, 0x0, 0x0, 0xff, 0x9}, 0x14) 04:06:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x0, 0x1, ','}, 0x9) sendto(r0, &(0x7f0000000180)="df", 0x1, 0x0, &(0x7f0000000240)=@in={0x10, 0x2}, 0x10) 04:06:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4897cb2803c6909, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 04:06:32 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x915}, 0x14}}, 0x0) 04:06:32 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x915}, 0x14}}, 0x0) 04:06:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc", 0x7}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x3, &(0x7f0000000ec0)=@framed, &(0x7f0000000f00)='syzkaller\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x5, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:06:32 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000015c0), 0x40, 0x0) [ 526.653493][T11166] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 526.692843][T11166] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 526.701607][T11166] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 526.848096][T11166] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 04:06:33 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 04:06:33 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x3, 0x0, 0x0) 04:06:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:33 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc", 0x7}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:33 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 04:06:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x5, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 04:06:33 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_LK(r0, 0x0, 0x0) [ 527.635501][T11181] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 527.683543][T11181] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 527.719095][T11181] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:34 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:34 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x1a, 0x0, 0x0) 04:06:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc", 0x7}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:34 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000c40)={0x14}, 0x14}}, 0x0) 04:06:34 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={0x0}, 0x10) [ 528.729236][T11202] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 528.753266][T11202] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:34 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="db2631de3c1c"], 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x8008, &(0x7f0000000000)=0x2ffffff, 0x18) 04:06:34 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x56a, 0xb9, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0x5e, 0x0, 0x1, [{0x0, 0x0}]}) [ 529.174006][T11202] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:35 executing program 1: sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000180)={'syz', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan0\x00'}) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) keyctl$join(0x1, &(0x7f0000000d80)={'syz', 0x1}) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) 04:06:35 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7", 0x34}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e3", 0xa}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:35 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000280), 0x1, 0x2) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eb5ef19c"}}) [ 529.803423][T11221] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 529.824849][T11221] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 529.870463][T11221] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:36 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000280), 0x1, 0x2) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eb5ef19c"}}) 04:06:36 executing program 3: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) 04:06:36 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7", 0x34}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e3", 0xa}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x1, [@empty]}) [ 530.732405][ T6271] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 531.702769][ T6271] usb 3-1: Using ep0 maxpacket: 32 [ 531.822515][ T6271] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 532.076919][ T6271] usb 3-1: string descriptor 0 read error: -22 [ 532.083336][ T6271] usb 3-1: New USB device found, idVendor=056a, idProduct=00b9, bcdDevice= 0.40 [ 532.092638][ T6271] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 532.146238][ T6271] usbhid 3-1:1.0: couldn't find an input interrupt endpoint [ 532.346880][ T6627] usb 3-1: USB disconnect, device number 6 04:06:38 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002d40)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 04:06:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7", 0x34}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:38 executing program 3: getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) 04:06:38 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e3", 0xa}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x1, [@empty]}) 04:06:38 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000000)=0x301000, 0x4) 04:06:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c40)={0x14}, 0x14}}, 0x0) 04:06:38 executing program 2: pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 04:06:38 executing program 3: sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 04:06:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x8082) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 04:06:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf9808", 0x4e}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb", 0xc}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:39 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:39 executing program 3: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) 04:06:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x6, 0x0, &(0x7f0000000080)) 04:06:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x5451, 0x0) 04:06:39 executing program 2: clock_nanosleep(0x0, 0x1, &(0x7f0000000180), 0x0) 04:06:39 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x21a800, 0x0) 04:06:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf9808", 0x4e}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb", 0xc}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:40 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8910, &(0x7f00000006c0)={'batadv_slave_1\x00'}) 04:06:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x2, 0x0, &(0x7f0000000080)) 04:06:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000600)={0x34, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) 04:06:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x4, &(0x7f0000000540)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000580)='GPL\x00', 0x7, 0xf2, &(0x7f00000005c0)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:40 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = getpid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x26900, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0x0, 0x0, 0x1, 0x0, 0x7ff, r0}) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x40001) [ 535.054156][T11296] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 535.076129][T11296] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 535.173685][T11296] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 04:06:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x4, &(0x7f0000000540)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000580)='GPL\x00', 0x7, 0xf2, &(0x7f00000005c0)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:41 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb", 0xc}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf9808", 0x4e}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:41 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="f10e0700000000000000aaaa86dd60b13ce60010000000000000aa110477bfb82e577599bb37f7"], 0x0) 04:06:41 executing program 2: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='/dev/net/tun\x00', &(0x7f00000000c0)='\xe7(\x00', 0x0) 04:06:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x4, &(0x7f0000000540)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000580)='GPL\x00', 0x7, 0xf2, &(0x7f00000005c0)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:42 executing program 2: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='/dev/net/tun\x00', &(0x7f00000000c0)='\xe7(\x00', 0x0) 04:06:42 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) [ 536.780241][T11314] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 536.793395][T11314] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 536.805815][T11314] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 04:06:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542", 0x5b}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x4, &(0x7f0000000540)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000580)='GPL\x00', 0x7, 0xf2, &(0x7f00000005c0)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:06:42 executing program 2: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='/dev/net/tun\x00', &(0x7f00000000c0)='\xe7(\x00', 0x0) [ 537.033529][T11335] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 537.056736][T11335] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 537.256461][T11335] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 04:06:43 executing program 1: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='/dev/net/tun\x00', &(0x7f00000000c0)='\xe7(\x00', 0x0) 04:06:43 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542", 0x5b}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:43 executing program 1: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='/dev/net/tun\x00', &(0x7f00000000c0)='\xe7(\x00', 0x0) 04:06:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:43 executing program 2: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='/dev/net/tun\x00', &(0x7f00000000c0)='\xe7(\x00', 0x0) 04:06:43 executing program 1: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='/dev/net/tun\x00', &(0x7f00000000c0)='\xe7(\x00', 0x0) 04:06:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542", 0x5b}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:44 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000077c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x10}}], 0x48}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) getdents64(0xffffffffffffffff, 0xfffffffffffffffe, 0x29) dup(0xffffffffffffffff) 04:06:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:44 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) rt_sigqueueinfo(0x0, 0xd, 0x0) getpid() process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {0x0}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) rt_tgsigqueueinfo(0x0, 0x0, 0x38, &(0x7f00000022c0)={0x0, 0x0, 0x984}) process_vm_readv(0x0, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/140, 0x8c}, {0x0}, {0x0}], 0x3, &(0x7f0000000040)=[{&(0x7f0000000640)=""/199, 0xc7}, {&(0x7f0000000740)=""/67, 0x43}], 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) getpid() process_vm_writev(0x0, &(0x7f0000001f40)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002240)=[{&(0x7f0000001fc0)=""/76, 0x4c}, {0x0}, {0x0}], 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, 0x18, 0xa01, 0x0, 0x0, {0x4}, [@typed={0x8, 0x84, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 538.844100][T11352] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 538.856767][T11352] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 538.868957][T11352] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 04:06:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a00), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000005c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0xd20b}}) 04:06:44 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:44 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) preadv2(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/252, 0xfc}], 0x1, 0x0, 0x0, 0x0) 04:06:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x24}}, 0x0) [ 539.140197][T11375] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 539.162725][T11375] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 539.210867][T11375] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:45 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x89, 0xb0}, 0x48) 04:06:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf", 0x61}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:45 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:45 executing program 3: syz_clone(0x88020000, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) [ 539.879634][T11378] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 04:06:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000e80)=@mangle={'mangle\x00', 0x44, 0x6, 0x488, 0x98, 0x68, 0x130, 0x0, 0x2f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00', {}, {}, 0x6}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x20}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@remote}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@osf={{0x50}, {'syz0\x00'}}]}, @TTL={0x28}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'nr0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@inet=@dccp={{0x30}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 04:06:45 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x72, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x1, 0x1, 0x0, 0x20, 0x1, [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "5ff2f7"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0xcf, 0x100, 0x0, 0x81}, [@ncm={0x6, 0x24, 0x1a, 0xffc1, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0x3d}, @mbim_extended={0x8, 0x24, 0x1c, 0x89fc, 0x2}, @network_terminal={0x7, 0x24, 0xa, 0x0, 0x3, 0x1, 0x1f}, @call_mgmt={0x5, 0x24, 0x1, 0x0, 0xff}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x1, 0x3f, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x2, 0x0, 0x7}}}}}]}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000440)={0xa, 0x6, 0x300, 0x0, 0xff, 0x0, 0x10, 0x9}, 0x6f, &(0x7f0000000480)={0x5, 0xf, 0x6f, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0xc, 0x0, 0x8}, @ss_container_id={0x14, 0x10, 0x4, 0x10, "a7e514dcbce462773b57617845cec958"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x7f, 0x8, 0x1}, @generic={0x27, 0x10, 0xa, "ea7bfb359cf589d1e6dea4c74cdf0dc4f379dff489d34ac0455e043283dd731aa906ece0"}, @ss_container_id={0x14, 0x10, 0x4, 0x92, "3e9798a27135e1b79df00ea0d8952f6c"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0xbc, 0x7f, 0x1ff}]}, 0x1, [{0x0, 0x0}]}) 04:06:45 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000180)=0x1, 0x4) [ 540.041570][T11390] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 540.145267][T11395] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 540.167114][T11395] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 540.295827][T11395] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 540.542491][ T6627] usb 2-1: new high-speed USB device number 2 using dummy_hcd 04:06:46 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf", 0x61}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000e80)=@mangle={'mangle\x00', 0x44, 0x6, 0x488, 0x98, 0x68, 0x130, 0x0, 0x2f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00', {}, {}, 0x6}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x20}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@remote}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@osf={{0x50}, {'syz0\x00'}}]}, @TTL={0x28}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'nr0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@inet=@dccp={{0x30}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 04:06:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 540.922494][ T6627] usb 2-1: Using ep0 maxpacket: 8 04:06:46 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x8, &(0x7f0000000480)={0x5, 0xf, 0x8, 0x1, [@generic={0x3}]}}) 04:06:46 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) [ 540.987424][T11400] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING 04:06:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 541.068197][T11409] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 541.081755][T11409] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 541.099627][T11409] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 541.162764][ T6627] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x3 has invalid maxpacket 8 [ 541.197426][ T6627] usb 2-1: config 1 interface 0 has no altsetting 0 04:06:47 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 04:06:47 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/pid\x00') 04:06:47 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) [ 541.497746][ T6627] usb 2-1: string descriptor 0 read error: -22 [ 541.504261][ T6627] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 541.514086][ T6627] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 541.522594][ T5466] usb 4-1: new high-speed USB device number 11 using dummy_hcd [ 541.552956][T11396] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 541.783483][ T5466] usb 4-1: Using ep0 maxpacket: 8 [ 541.805611][ T6627] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 541.835885][ T6627] usb 2-1: USB disconnect, device number 2 [ 542.012577][ T5466] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 542.023122][ T5466] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 542.033521][ T5466] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 542.045080][ T5466] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 542.232719][ T5466] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 542.242121][ T5466] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 542.250593][ T5466] usb 4-1: Product: syz [ 542.255245][ T5466] usb 4-1: Manufacturer: syz [ 542.259997][ T5466] usb 4-1: SerialNumber: syz 04:06:48 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:48 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) 04:06:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf", 0x61}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:48 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x72, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x1, 0x1, 0x0, 0x20, 0x1, [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "5ff2f7"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0xcf, 0x100, 0x0, 0x81}, [@ncm={0x6, 0x24, 0x1a, 0xffc1, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0x3d}, @mbim_extended={0x8, 0x24, 0x1c, 0x89fc, 0x2}, @network_terminal={0x7, 0x24, 0xa, 0x0, 0x3, 0x1, 0x1f}, @call_mgmt={0x5, 0x24, 0x1, 0x0, 0xff}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x1, 0x3f, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x2, 0x0, 0x7}}}}}]}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000440)={0xa, 0x6, 0x300, 0x0, 0xff, 0x0, 0x10, 0x9}, 0x6f, &(0x7f0000000480)={0x5, 0xf, 0x6f, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0xc, 0x0, 0x8}, @ss_container_id={0x14, 0x10, 0x4, 0x10, "a7e514dcbce462773b57617845cec958"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x7f, 0x8, 0x1}, @generic={0x27, 0x10, 0xa, "ea7bfb359cf589d1e6dea4c74cdf0dc4f379dff489d34ac0455e043283dd731aa906ece0"}, @ss_container_id={0x14, 0x10, 0x4, 0x92, "3e9798a27135e1b79df00ea0d8952f6c"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0xbc, 0x7f, 0x1ff}]}, 0x1, [{0x0, 0x0}]}) [ 542.303656][ T5466] cdc_ether: probe of 4-1:1.0 failed with error -22 [ 542.424264][T11433] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 542.435309][T11433] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 542.443828][T11433] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 542.511445][ T6263] usb 4-1: USB disconnect, device number 11 [ 542.550052][T11434] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 542.565322][T11434] device gretap0 entered promiscuous mode [ 542.660301][T11432] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 542.679609][T11432] 0ªX: renamed from gretap0 [ 542.684498][ T6313] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 542.709498][T11432] device 00ªX left promiscuous mode [ 542.726004][T11432] A link change request failed with some changes committed already. Interface 00ªX may have been left with an inconsistent configuration, please check. [ 542.942443][ T6313] usb 2-1: Using ep0 maxpacket: 8 04:06:48 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x8, &(0x7f0000000480)={0x5, 0xf, 0x8, 0x1, [@generic={0x3}]}}) 04:06:48 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 543.152679][ T6313] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x3 has invalid maxpacket 8 04:06:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a", 0x64}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) [ 543.202446][ T6313] usb 2-1: config 1 interface 0 has no altsetting 0 04:06:49 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 543.302270][T11443] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 543.315119][T11443] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 543.327492][T11443] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 543.383419][ T6263] usb 4-1: new high-speed USB device number 12 using dummy_hcd [ 543.443285][ T6313] usb 2-1: string descriptor 0 read error: -22 [ 543.450475][ T6313] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 543.460065][ T6313] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 543.481211][T11447] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 543.492697][T11431] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 543.508007][T11447] device 00ªX entered promiscuous mode [ 543.600587][T11447] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 543.616175][T11447] 1ªX: renamed from 00ªX [ 543.622423][ T6263] usb 4-1: Using ep0 maxpacket: 8 [ 543.633411][T11447] device 01ªX left promiscuous mode [ 543.661216][T11447] A link change request failed with some changes committed already. Interface 01ªX may have been left with an inconsistent configuration, please check. [ 543.732721][ T6313] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 543.757201][ T6313] usb 2-1: USB disconnect, device number 3 [ 543.822583][ T6263] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 543.841609][ T6263] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 543.852254][ T6263] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 543.862592][ T6263] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 04:06:49 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a", 0x64}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) [ 544.033423][ T6263] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 544.048982][ T6263] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 544.057630][ T6263] usb 4-1: Product: syz [ 544.062556][ T6263] usb 4-1: Manufacturer: syz [ 544.067697][ T6263] usb 4-1: SerialNumber: syz [ 544.135871][ T6263] cdc_ether: probe of 4-1:1.0 failed with error -22 04:06:50 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) 04:06:50 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 544.312043][T11458] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 544.325252][T11458] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 544.335318][T11458] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 544.431163][ T6263] usb 4-1: USB disconnect, device number 12 [ 544.480384][T11459] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 544.529450][T11459] device 01ªX entered promiscuous mode [ 544.599006][T11465] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 544.641585][T11465] device gretap0 entered promiscuous mode [ 544.731242][T11459] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 544.751744][T11459] 0ªX: renamed from 01ªX [ 544.777038][T11459] device 00ªX left promiscuous mode [ 544.809394][T11459] A link change request failed with some changes committed already. Interface 00ªX may have been left with an inconsistent configuration, please check. [ 544.891390][T11463] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 544.907750][T11463] 0ªX: renamed from gretap0 [ 544.943062][T11463] device 00ªX left promiscuous mode 04:06:50 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) 04:06:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a", 0x64}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) [ 544.971487][T11463] A link change request failed with some changes committed already. Interface 00ªX may have been left with an inconsistent configuration, please check. 04:06:50 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) [ 545.217141][T11472] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 04:06:51 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 545.335959][T11472] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 545.409518][T11472] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:51 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 545.529282][T11478] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 545.540828][T11478] device gretap0 entered promiscuous mode [ 545.738200][T11483] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 545.751972][T11483] device 00ªX entered promiscuous mode [ 545.849744][T11485] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 545.871786][T11485] device 00ªX entered promiscuous mode 04:06:51 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a8613", 0x66}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb46", 0x4a}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 546.118615][T11477] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 546.139626][T11477] 0ªX: renamed from gretap0 [ 546.325423][T11477] device 00ªX left promiscuous mode [ 546.337071][T11477] A link change request failed with some changes committed already. Interface 00ªX may have been left with an inconsistent configuration, please check. [ 546.353693][T11495] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 546.365062][T11495] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:52 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 546.387829][T11495] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 546.407452][T11483] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 546.417258][T11483] 1ªX: renamed from 00ªX [ 546.570093][T11483] device 01ªX left promiscuous mode [ 546.599694][T11483] A link change request failed with some changes committed already. Interface 01ªX may have been left with an inconsistent configuration, please check. [ 546.689772][T11485] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 546.699874][T11485] 1ªX: renamed from 00ªX [ 546.708314][T11485] device 01ªX left promiscuous mode [ 546.719270][T11485] A link change request failed with some changes committed already. Interface 01ªX may have been left with an inconsistent configuration, please check. [ 546.755381][T11499] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 546.795266][T11499] device 00ªX entered promiscuous mode 04:06:52 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a8613", 0x66}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:52 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) 04:06:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb46", 0x4a}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 547.038880][T11510] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 547.051735][T11510] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 547.090674][T11510] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb46", 0x4a}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:53 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 547.427978][T11499] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 547.438988][T11499] 1ªX: renamed from 00ªX [ 547.472572][T11499] device 01ªX left promiscuous mode [ 547.490579][T11499] A link change request failed with some changes committed already. Interface 01ªX may have been left with an inconsistent configuration, please check. [ 547.582965][T11512] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 547.597657][T11512] device 01ªX entered promiscuous mode 04:06:53 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac3617ec82c3d99e845692c866af5a8af851e211e476", 0xae}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a8613", 0x66}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) [ 547.730360][T11519] device 01ªX entered promiscuous mode [ 547.948380][T11512] 0ªX: renamed from 01ªX 04:06:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb5", 0x6f}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 548.287385][T11512] device 00ªX left promiscuous mode [ 548.320319][T11512] A link change request failed with some changes committed already. Interface 00ªX may have been left with an inconsistent configuration, please check. 04:06:54 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 548.415008][T11519] 0ªX: renamed from 01ªX [ 548.469447][T11519] device 00ªX left promiscuous mode [ 548.488818][T11519] A link change request failed with some changes committed already. Interface 00ªX may have been left with an inconsistent configuration, please check. 04:06:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:54 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) [ 548.765648][T11533] device 01ªX entered promiscuous mode 04:06:54 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x72, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x1, 0x1, 0x0, 0x20, 0x1, [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "5ff2f7"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0xcf, 0x100, 0x0, 0x81}, [@ncm={0x6, 0x24, 0x1a, 0xffc1, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0x3d}, @mbim_extended={0x8, 0x24, 0x1c, 0x89fc, 0x2}, @network_terminal={0x7, 0x24, 0xa, 0x0, 0x3, 0x1, 0x1f}, @call_mgmt={0x5, 0x24, 0x1, 0x0, 0xff}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x1, 0x3f, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x2, 0x0, 0x7}}}}}]}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000440)={0xa, 0x6, 0x300, 0x0, 0xff, 0x0, 0x10, 0x9}, 0x6f, &(0x7f0000000480)={0x5, 0xf, 0x6f, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0xc, 0x0, 0x8}, @ss_container_id={0x14, 0x10, 0x4, 0x10, "a7e514dcbce462773b57617845cec958"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x7f, 0x8, 0x1}, @generic={0x27, 0x10, 0xa, "ea7bfb359cf589d1e6dea4c74cdf0dc4f379dff489d34ac0455e043283dd731aa906ece0"}, @ss_container_id={0x14, 0x10, 0x4, 0x92, "3e9798a27135e1b79df00ea0d8952f6c"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0xbc, 0x7f, 0x1ff}]}, 0x1, [{0x0, 0x0}]}) [ 548.941502][T11540] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 548.954855][T11540] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb5", 0x6f}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 549.201679][T11540] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:55 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) [ 549.431915][T11533] 0ªX: renamed from 01ªX [ 549.451943][T11533] device 00ªX left promiscuous mode [ 549.525159][T11549] device 00ªX entered promiscuous mode [ 549.552410][ T6272] usb 2-1: new high-speed USB device number 4 using dummy_hcd 04:06:55 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:55 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) [ 549.722597][T11554] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 549.733931][T11554] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 549.802781][ T6272] usb 2-1: Using ep0 maxpacket: 8 04:06:55 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) [ 549.831313][T11556] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 549.843309][T11556] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:55 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:55 executing program 3: r0 = gettid() rt_tgsigqueueinfo(r0, r0, 0x17, &(0x7f0000000000)={0x0, 0x0, 0x17d5}) [ 549.941466][T11558] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 549.952558][T11558] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 549.998518][T11549] __nla_validate_parse: 6 callbacks suppressed [ 549.998557][T11549] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 550.021387][T11549] 1ªX: renamed from 00ªX [ 550.023309][ T6272] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x3 has invalid maxpacket 8 04:06:55 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002140)='/proc/diskstats\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000ec0), 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000300)={0xa, &(0x7f0000000280)=[{0x5af, 0x1, 0x8, 0x400}, {0x3, 0x6, 0xf0, 0x3f}, {0x5, 0xff, 0x46, 0xdf6}, {0x8, 0x5, 0x2}, {0xfffd, 0x5, 0x0, 0x7}, {0x81, 0x5, 0xff, 0x10000}, {0x99a, 0xff, 0x6, 0x8}, {0xa00, 0x9, 0x6, 0x1}, {0x1, 0xc0, 0x0, 0x2}, {0x88e, 0x1, 0x40, 0x1}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000380)={0x6, &(0x7f0000000340)=[{0xc, 0x4, 0x3f}, {0xfffe, 0x9}, {0x0, 0x6, 0xfe}, {0x7, 0x1f, 0x4, 0xfffffffc}, {0x7, 0x21, 0x3, 0x8}, {0x2, 0x1, 0x7, 0x800}]}) sync() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000400)={0x4, &(0x7f00000003c0)=[{0x3ff, 0x0, 0x3, 0xffff2494}, {0x5, 0x3f, 0xe8, 0x5}, {0x43d, 0x2, 0x0, 0x8000}, {0x8000, 0x9, 0x7, 0x8d95}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000480)={0x7, &(0x7f0000000440)=[{0x761, 0xf8, 0x3, 0x401}, {0x9, 0x1, 0x1, 0x9}, {0x3f, 0x1, 0x0, 0xffff}, {0x7ff, 0x5, 0x5, 0x81}, {0x5, 0x1, 0x5, 0xff}, {0x3, 0x7f, 0x4, 0x80000000}, {0x8e, 0x0, 0x81, 0x1}]}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cgroups\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r2) r3 = accept$unix(r0, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)) socketpair(0x1d, 0x80000, 0x4, &(0x7f0000000680)) [ 550.053283][ T6272] usb 2-1: config 1 interface 0 has no altsetting 0 [ 550.078523][T11549] device 01ªX left promiscuous mode 04:06:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb5", 0x6f}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 550.209753][T11567] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 550.268552][T11567] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 550.302748][ T6272] usb 2-1: string descriptor 0 read error: -22 [ 550.313723][ T6272] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 550.333976][T11564] can: request_module (can-proto-4) failed. 04:06:56 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002140)='/proc/diskstats\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000ec0), 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000300)={0xa, &(0x7f0000000280)=[{0x5af, 0x1, 0x8, 0x400}, {0x3, 0x6, 0xf0, 0x3f}, {0x5, 0xff, 0x46, 0xdf6}, {0x8, 0x5, 0x2}, {0xfffd, 0x5, 0x0, 0x7}, {0x81, 0x5, 0xff, 0x10000}, {0x99a, 0xff, 0x6, 0x8}, {0xa00, 0x9, 0x6, 0x1}, {0x1, 0xc0, 0x0, 0x2}, {0x88e, 0x1, 0x40, 0x1}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000380)={0x6, &(0x7f0000000340)=[{0xc, 0x4, 0x3f}, {0xfffe, 0x9}, {0x0, 0x6, 0xfe}, {0x7, 0x1f, 0x4, 0xfffffffc}, {0x7, 0x21, 0x3, 0x8}, {0x2, 0x1, 0x7, 0x800}]}) sync() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000400)={0x4, &(0x7f00000003c0)=[{0x3ff, 0x0, 0x3, 0xffff2494}, {0x5, 0x3f, 0xe8, 0x5}, {0x43d, 0x2, 0x0, 0x8000}, {0x8000, 0x9, 0x7, 0x8d95}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000480)={0x7, &(0x7f0000000440)=[{0x761, 0xf8, 0x3, 0x401}, {0x9, 0x1, 0x1, 0x9}, {0x3f, 0x1, 0x0, 0xffff}, {0x7ff, 0x5, 0x5, 0x81}, {0x5, 0x1, 0x5, 0xff}, {0x3, 0x7f, 0x4, 0x80000000}, {0x8e, 0x0, 0x81, 0x1}]}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cgroups\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r2) r3 = accept$unix(r0, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)) socketpair(0x1d, 0x80000, 0x4, &(0x7f0000000680)) [ 550.364261][ T6272] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 550.444984][T11544] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 550.670805][T11572] can: request_module (can-proto-4) failed. [ 550.702562][ T6272] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 550.733304][ T6272] usb 2-1: USB disconnect, device number 4 04:06:57 executing program 1: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 04:06:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x4, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:57 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setpgid(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = syz_io_uring_setup(0x4dae, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getpid() ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000002c0)={0x0, 'xfrm0\x00', {}, 0x6}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x200) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, 0x80, 0x0}}], 0x1, 0x4000) io_uring_enter(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r11, &(0x7f0000000480)=@IORING_OP_OPENAT={0x12, 0x6, 0x0, r12, 0x0, &(0x7f00000004c0)='./file0\x00', 0xa0, 0x30001, 0x23456, {0x0, r13}}, 0x1ff) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0000ff3f04000000170a001700000000040037000a00030001302564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r14, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty, 0x1}, @phonet={0x23, 0x99, 0xf9, 0x4}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='macvlan1\x00'}) 04:06:57 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x70, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5e, 0x1, 0x1, 0x0, 0x20, 0x0, [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x2, 0x6, 0x0, 0x80, {{0x8, 0x24, 0x6, 0x0, 0x0, "5ff2f7"}, {0x5, 0x24, 0x0, 0x2}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x100, 0x0, 0x81}, [@ncm={0x6, 0x24, 0x1a, 0xffc1, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x6, 0x3d, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0x2, 0x78a}, @country_functional={0xa, 0x24, 0x7, 0x0, 0x0, [0x0, 0x0]}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x0, 0x3f, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x2, 0x8, 0x7}}}}}]}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x6c, &(0x7f0000000480)={0x5, 0xf, 0x6c, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0x0, 0x0, 0x8, 0x2}, @ss_container_id={0x14, 0x10, 0x4, 0x10, "a7e514dcbce462773b57617845cec958"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x7f, 0x8, 0x1}, @generic={0x24, 0x10, 0xa, "ea7bfb359cf589d1e6dea4c74cdf0dc4f379dff489d34ac0455e043283dd731aa9"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "3e9798a27135e1b79df00ea0d8952f6c"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0xbc, 0x7f, 0x1ff}]}, 0x1, [{0x0, 0x0}]}) 04:06:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc697", 0x82}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:57 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:57 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x84, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x72, 0x1, 0x1, 0x1f, 0x20, 0x1, [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x2, 0x6, 0x0, 0x80, {{0x8, 0x24, 0x6, 0x0, 0x0, "5ff2f7"}, {0x5, 0x24, 0x0, 0x2}, {0xd, 0x24, 0xf, 0x1, 0xcf, 0x100, 0x0, 0x81}, [@ncm={0x6, 0x24, 0x1a, 0xffc1, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x6, 0x3d, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x89fc, 0x2, 0x78a}, @network_terminal={0x7, 0x24, 0xa, 0x40, 0x3, 0x1, 0x1f}, @country_functional={0x12, 0x24, 0x7, 0x5, 0x80, [0x5, 0x4, 0x4, 0x3, 0x31, 0x8]}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0xff}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x1, 0x3f, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x2, 0x8, 0x7}}}}}]}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000440)={0xa, 0x6, 0x300, 0x4, 0xff, 0x0, 0x10, 0x9}, 0x6f, &(0x7f0000000480)={0x5, 0xf, 0x6f, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0xc, 0x8, 0x8, 0x2}, @ss_container_id={0x14, 0x10, 0x4, 0x10, "a7e514dcbce462773b57617845cec958"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x7f, 0x8, 0x1}, @generic={0x27, 0x10, 0xa, "ea7bfb359cf589d1e6dea4c74cdf0dc4f379dff489d34ac0455e043283dd731aa906ece0"}, @ss_container_id={0x14, 0x10, 0x4, 0x92, "3e9798a27135e1b79df00ea0d8952f6c"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0xbc, 0x7f, 0x1ff}]}, 0x2, [{0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x44e}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0xc09}}]}) [ 551.434862][T11586] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 551.455143][T11586] device 01ªX entered promiscuous mode [ 551.520427][T11591] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 551.563904][T11591] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 551.572452][ T6263] usb 4-1: new high-speed USB device number 13 using dummy_hcd [ 551.586152][T11591] net_ratelimit: 6 callbacks suppressed [ 551.586159][T11591] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 551.672546][ T6536] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 551.730042][T11586] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 551.772615][T11586] 0ªX: renamed from 01ªX [ 551.808491][T11586] device 00ªX left promiscuous mode [ 551.814119][ T6263] usb 4-1: Using ep0 maxpacket: 8 [ 551.836859][T11586] A link change request failed with some changes committed already. Interface 00ªX may have been left with an inconsistent configuration, please check. [ 551.943504][ T6536] usb 2-1: Using ep0 maxpacket: 8 [ 552.012605][ T6263] usb 4-1: config 1 interface 0 altsetting 9 bulk endpoint 0x3 has invalid maxpacket 8 [ 552.034553][ T6263] usb 4-1: config 1 interface 0 has no altsetting 0 04:06:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc697", 0x82}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {0x0}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) [ 552.173674][ T6536] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x3 has invalid maxpacket 8 [ 552.195238][ T6536] usb 2-1: config 1 interface 0 has no altsetting 0 04:06:58 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000600)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0x58}, 0x20) [ 552.292744][ T6263] usb 4-1: string descriptor 0 read error: -22 [ 552.302152][ T6263] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 552.329297][ T6263] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 04:06:58 executing program 2: r0 = memfd_create(&(0x7f0000000580)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4\xa5\xba:*Md0\xf3\xce\xac\xf3QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\xe9>~\x93\xd1\xb7\x1eh\x15\x97pm\x8f\x94\\\xd5\b\x9e\f\x80\x8f\xf8\xb25\xa7\xae\x843b\x98\xb0;\f\xe0}\xfd\tY5\xd4|\xbb|\xb2\xbe\xff\xb3EM\x19V\x01\x15\r\x8c\xb8\x1a\x00\x00\x00\x00\x00\x05,\x17i\xaa\xe9\x1fG\xee\xe4\x900@\xe9\xa8\xab\xbb\xacZZ\x15\x13\x02\x03\x9ee!z\xec\xdf\x8cZ\x871\xdd\x1d\xdf\x87\xa7\x93\xd1\xd0\xd7\xe8\xd1\x9c\x01\xe1\xcen\x05Th^c\xd5\xad$0\xf9\xa66\x88C/e@\x0fxKAN\xd6\x0e\xae\xca\xb6\xbd7\xed\xb9\xbd\x9d\x95\xdb\x8b\xaa\xd88\b(\r\x01\x0e\x83\x93a\xf5M\xe6\xb9t2\xed\x00\x99LD\x91\xec\xfb\xdb\x04\x8e\xbda\xf3\t|\x10\xa1\x7fG\x91\xd9\xf0\x87)J\x82\xe8\x1f\b\xdd\x00\xbbuWt\xa0]\xder\\E\x8c,7v[>\x93\x03\x0e\x85\xccj5B\xd8\xfd\xc5X\xd2\x00\x00\x00\x00\x00\x00\xe5\xd78\xdc\xf7\x80Kt\xa7[d+\xd2\x12\xf5\xd7\x92q\xc9\\g\xfc\xe2v\xe5\xee=\xbc7\x94\"\xed\xb0\x87\x9a\xca}\x98\xe1W\xbf\r\xc8\xe4y\x00\x00\x00\x00', 0x7) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1000003, 0x2012, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000335000/0x2000)=nil, 0x10f600) [ 552.373017][T11581] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 552.427150][ T6536] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 552.442482][ T6536] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 552.470398][ T6536] usb 2-1: Product: syz [ 552.485454][ T6536] usb 2-1: Manufacturer: à°‰ [ 552.501294][ T6536] usb 2-1: SerialNumber: syz 04:06:58 executing program 2: r0 = memfd_create(&(0x7f0000000580)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4\xa5\xba:*Md0\xf3\xce\xac\xf3QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\xe9>~\x93\xd1\xb7\x1eh\x15\x97pm\x8f\x94\\\xd5\b\x9e\f\x80\x8f\xf8\xb25\xa7\xae\x843b\x98\xb0;\f\xe0}\xfd\tY5\xd4|\xbb|\xb2\xbe\xff\xb3EM\x19V\x01\x15\r\x8c\xb8\x1a\x00\x00\x00\x00\x00\x05,\x17i\xaa\xe9\x1fG\xee\xe4\x900@\xe9\xa8\xab\xbb\xacZZ\x15\x13\x02\x03\x9ee!z\xec\xdf\x8cZ\x871\xdd\x1d\xdf\x87\xa7\x93\xd1\xd0\xd7\xe8\xd1\x9c\x01\xe1\xcen\x05Th^c\xd5\xad$0\xf9\xa66\x88C/e@\x0fxKAN\xd6\x0e\xae\xca\xb6\xbd7\xed\xb9\xbd\x9d\x95\xdb\x8b\xaa\xd88\b(\r\x01\x0e\x83\x93a\xf5M\xe6\xb9t2\xed\x00\x99LD\x91\xec\xfb\xdb\x04\x8e\xbda\xf3\t|\x10\xa1\x7fG\x91\xd9\xf0\x87)J\x82\xe8\x1f\b\xdd\x00\xbbuWt\xa0]\xder\\E\x8c,7v[>\x93\x03\x0e\x85\xccj5B\xd8\xfd\xc5X\xd2\x00\x00\x00\x00\x00\x00\xe5\xd78\xdc\xf7\x80Kt\xa7[d+\xd2\x12\xf5\xd7\x92q\xc9\\g\xfc\xe2v\xe5\xee=\xbc7\x94\"\xed\xb0\x87\x9a\xca}\x98\xe1W\xbf\r\xc8\xe4y\x00\x00\x00\x00', 0x7) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1000003, 0x2012, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000335000/0x2000)=nil, 0x10f600) [ 552.542863][T11589] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 04:06:58 executing program 2: r0 = memfd_create(&(0x7f0000000580)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4\xa5\xba:*Md0\xf3\xce\xac\xf3QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\xe9>~\x93\xd1\xb7\x1eh\x15\x97pm\x8f\x94\\\xd5\b\x9e\f\x80\x8f\xf8\xb25\xa7\xae\x843b\x98\xb0;\f\xe0}\xfd\tY5\xd4|\xbb|\xb2\xbe\xff\xb3EM\x19V\x01\x15\r\x8c\xb8\x1a\x00\x00\x00\x00\x00\x05,\x17i\xaa\xe9\x1fG\xee\xe4\x900@\xe9\xa8\xab\xbb\xacZZ\x15\x13\x02\x03\x9ee!z\xec\xdf\x8cZ\x871\xdd\x1d\xdf\x87\xa7\x93\xd1\xd0\xd7\xe8\xd1\x9c\x01\xe1\xcen\x05Th^c\xd5\xad$0\xf9\xa66\x88C/e@\x0fxKAN\xd6\x0e\xae\xca\xb6\xbd7\xed\xb9\xbd\x9d\x95\xdb\x8b\xaa\xd88\b(\r\x01\x0e\x83\x93a\xf5M\xe6\xb9t2\xed\x00\x99LD\x91\xec\xfb\xdb\x04\x8e\xbda\xf3\t|\x10\xa1\x7fG\x91\xd9\xf0\x87)J\x82\xe8\x1f\b\xdd\x00\xbbuWt\xa0]\xder\\E\x8c,7v[>\x93\x03\x0e\x85\xccj5B\xd8\xfd\xc5X\xd2\x00\x00\x00\x00\x00\x00\xe5\xd78\xdc\xf7\x80Kt\xa7[d+\xd2\x12\xf5\xd7\x92q\xc9\\g\xfc\xe2v\xe5\xee=\xbc7\x94\"\xed\xb0\x87\x9a\xca}\x98\xe1W\xbf\r\xc8\xe4y\x00\x00\x00\x00', 0x7) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1000003, 0x2012, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000335000/0x2000)=nil, 0x10f600) [ 552.619012][ T6263] cdc_ether: probe of 4-1:1.0 failed with error -71 [ 552.644530][ T6263] usb 4-1: USB disconnect, device number 13 04:06:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{}, {0x3}]}) 04:06:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xf, 0x3}, {0xf}, {0x6}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000004c0)=""/190, 0x53, 0xbe, 0x1}, 0x20) [ 552.882653][ T6536] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 552.907479][ T6536] usb 2-1: USB disconnect, device number 5 04:06:58 executing program 3: r0 = openat$tun(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 04:06:58 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:06:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000e80), 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 553.267075][T11620] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 04:06:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc697", 0x82}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:06:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {0x0}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:06:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x7, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xf}, {0x6}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000004c0)=""/190, 0x4b, 0xbe, 0x1}, 0x20) 04:06:59 executing program 3: r0 = openat$vga_arbiter(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$vga_arbiter(r0, 0x0, 0x0) 04:06:59 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x84, &(0x7f0000000380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x72, 0x1, 0x1, 0x1f, 0x20, 0x1, [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x2, 0x6, 0x0, 0x80, {{0x8, 0x24, 0x6, 0x0, 0x0, "5ff2f7"}, {0x5, 0x24, 0x0, 0x2}, {0xd, 0x24, 0xf, 0x1, 0xcf, 0x100, 0x0, 0x81}, [@ncm={0x6, 0x24, 0x1a, 0xffc1, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x6, 0x3d, 0x9}, @mbim_extended={0x8, 0x24, 0x1c, 0x89fc, 0x2, 0x78a}, @network_terminal={0x7, 0x24, 0xa, 0x40, 0x3, 0x1, 0x1f}, @country_functional={0x12, 0x24, 0x7, 0x5, 0x80, [0x5, 0x4, 0x4, 0x3, 0x31, 0x8]}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0xff}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x1, 0x3f, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x2, 0x8, 0x7}}}}}]}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000440)={0xa, 0x6, 0x300, 0x4, 0xff, 0x0, 0x10, 0x9}, 0x6f, &(0x7f0000000480)={0x5, 0xf, 0x6f, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0xc, 0x8, 0x8, 0x2}, @ss_container_id={0x14, 0x10, 0x4, 0x10, "a7e514dcbce462773b57617845cec958"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x7f, 0x8, 0x1}, @generic={0x27, 0x10, 0xa, "ea7bfb359cf589d1e6dea4c74cdf0dc4f379dff489d34ac0455e043283dd731aa906ece0"}, @ss_container_id={0x14, 0x10, 0x4, 0x92, "3e9798a27135e1b79df00ea0d8952f6c"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0xbc, 0x7f, 0x1ff}]}, 0x2, [{0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x44e}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0xc09}}]}) 04:06:59 executing program 2: mq_open(&(0x7f00000003c0)='batadv\x00', 0x0, 0x0, 0x0) 04:06:59 executing program 3: syslog(0x2, &(0x7f0000000040)=""/83, 0x53) syz_open_dev$vcsn(0x0, 0x1ff, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, 0x0, 0x0) [ 553.355798][T11620] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 553.410359][T11620] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:06:59 executing program 2: getgroups(0x2, &(0x7f00000000c0)=[0x0, 0x0]) 04:06:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x64}]}) 04:06:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x60, 0x0) [ 553.662629][ T6272] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 553.905423][ T6272] usb 2-1: Using ep0 maxpacket: 8 [ 554.102480][ T6272] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x3 has invalid maxpacket 8 [ 554.112191][ T6272] usb 2-1: config 1 interface 0 has no altsetting 0 [ 554.282891][ T6272] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 554.291992][ T6272] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 554.332209][ T6272] usb 2-1: Product: syz 04:07:00 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:00 executing program 2: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) 04:07:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be", 0x8b}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {0x0}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1b, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) 04:07:00 executing program 2: syz_open_dev$vcsn(&(0x7f0000000840), 0x1, 0x102) [ 554.352478][ T6272] usb 2-1: Manufacturer: à°‰ [ 554.357188][ T6272] usb 2-1: SerialNumber: syz [ 554.390967][T11630] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 554.416573][ T27] audit: type=1326 audit(1669262820.211:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=11646 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fec4128c0d9 code=0x0 [ 554.465185][ T27] audit: type=1326 audit(1669262820.261:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=11646 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7fec4123df8b code=0x0 [ 554.752487][T11657] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 554.766074][T11657] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 555.136499][ T6272] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 555.353381][ T6272] usb 2-1: USB disconnect, device number 6 [ 555.468892][T11657] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:01 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x80) 04:07:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:01 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x48041) write$cgroup_int(r0, &(0x7f0000000380), 0x12) 04:07:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be", 0x8b}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:01 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000004c0)=""/190, 0x43, 0xbe, 0x1}, 0x20) 04:07:01 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x80) [ 555.888955][T11673] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 555.909915][T11673] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 556.032267][T11673] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:02 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5421, 0x0) 04:07:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be", 0x8b}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f00000004c0)=""/190, 0x3e, 0xbe, 0x1}, 0x20) 04:07:02 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:02 executing program 1: migrate_pages(0xffffffffffffffff, 0x3, &(0x7f0000000000), &(0x7f0000000040)) 04:07:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f00000000c0)=[{}, {0x20}, {}]}) 04:07:02 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5452, 0x0) 04:07:02 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) [ 557.332492][T11692] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 557.345137][T11692] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:07:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b", 0x90}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 04:07:03 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5452, 0x0) 04:07:03 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) [ 558.043402][T11692] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xf, 0x3}, {}, {}, {}, {}, {}]}]}}, &(0x7f00000004c0)=""/190, 0x56, 0xbe, 0x1}, 0x20) [ 558.291773][T11712] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 558.312090][T11712] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:07:04 executing program 3: openat$vga_arbiter(0xffffff9c, &(0x7f0000000040), 0x2840, 0x0) 04:07:04 executing program 1: keyctl$get_persistent(0x14, 0xffffffffffffffff, 0xfffffffffffffff8) 04:07:04 executing program 2: socket$inet6_tcp(0xa, 0xc, 0x0) [ 558.363017][T11712] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:04 executing program 1: kexec_load(0x0, 0x2, &(0x7f0000002980)=[{0x0}, {0x0}], 0xa0000) 04:07:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) 04:07:04 executing program 3: openat$pidfd(0xffffff9c, &(0x7f0000000180), 0x12640, 0x0) [ 558.544643][ T27] audit: type=1326 audit(1669262824.341:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=11721 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa06868c0d9 code=0x0 04:07:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b", 0x57}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b", 0x90}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:04 executing program 1: openat$vcs(0xffffff9c, &(0x7f00000000c0), 0x8200, 0x0) 04:07:04 executing program 2: setrlimit(0xe, &(0x7f00000000c0)={0xbe, 0x7fff}) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)) syz_clone(0x10a2a000, 0x0, 0xb, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x801) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=ANY=[@ANYRES64]) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$peeksig(0x4209, r1, &(0x7f0000000040)={0x80690020, 0x0, 0x1000000}, &(0x7f0000000080)) 04:07:05 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:05 executing program 3: r0 = gettid() sched_setparam(r0, &(0x7f0000000000)) 04:07:05 executing program 1: r0 = fsopen(&(0x7f00000000c0)='9p\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 04:07:05 executing program 2: keyctl$get_persistent(0x11, 0xffffffffffffffff, 0xfffffffffffffff8) 04:07:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[], 0x1, 0x778, &(0x7f0000000800)="$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") open(&(0x7f0000000200)='./bus\x00', 0x602c2, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x101, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x2000ff97, 0xff01}) 04:07:05 executing program 1: syz_read_part_table(0x5cb, &(0x7f0000000000)="$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") 04:07:05 executing program 3: openat$pidfd(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) [ 559.520235][T11749] loop1: detected capacity change from 0 to 2048 [ 559.545900][T11752] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 04:07:05 executing program 3: openat$vcs(0xffffff9c, 0x0, 0x0, 0x0) [ 559.574357][T11747] loop2: detected capacity change from 0 to 2048 [ 559.612119][T11752] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 559.628699][T11752] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 559.677980][T11747] EXT4-fs error (device loop2): __ext4_fill_super:5380: inode #2: comm syz-executor.2: casefold flag without casefold feature [ 559.708866][T11747] EXT4-fs (loop2): warning: mounting fs with errors, running e2fsck is recommended [ 559.734912][T11747] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 04:07:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b", 0x57}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:05 executing program 1: syz_read_part_table(0x5cb, &(0x7f0000000000)="$eJzs2z9I3GcYB/Dnzh6BBJolU7rEDBlKloaMPWgSzjMhgeMSl5AhgYQSctMFAhd6EEgGvUHxBnF0EeEW/0yeNzgURcFZxMEiOLi06CJ06RXxtZNDrdpS+Hzg5eF93+/dcw/cb/wF/2vZ+K3b7WYionvp9J8eaBX6Ht4o3Ss/i8jEi4jo/fnr2cObTEocf+vNtN9K+8mJy52h/f5ca/Ppwa2XS41suv+U1pWp9sCZh+PCTeeXr37+Ui0O1/JvN4r1ncH1tScze4Vy+3GjOfso9+B1yq2kevy/eB+1+Bjv4lVUohJvonraxt+c3H+8td0T14ut+R+//72vM7J4J8VL5zDrSf7q33/U/0Pv6PNm/f7tuWtjd2sLq+XdnqNc5R88XQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/Pum88tXP3+pFodr+bcbxfrO4Prak5m9Qrn9uNGcfZR78DrlVlL9KtX3UYuP8S5eRSUq8Saq59R/vLX93R/Xi635bER0RhbvpFzpjHP+3f4fekefN+v3b89dG7tbW1gt7/Yc5SqXLugHAAAAAAAAAAAAAAAAAAAAQEQU+h7eKN0rP4vIxIuI+PbXn7KH5930vnsm4ofDejPlt9L55MTlztB+f661+fTg1sulxi/p/FNaV6baA//FPJzOnwEAAP//i2GSlQ==") 04:07:05 executing program 3: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c5e6667c94d5fda5761202e3e8cf02ebafba810724f763483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 04:07:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {}, [{0x54, 0x1, [@m_simple={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x7, 0x3, ']-\x00'}, @TCA_DEF_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 559.848903][ T5339] EXT4-fs (loop2): unmounting filesystem. [ 559.935679][T11761] loop3: detected capacity change from 0 to 256 [ 560.000701][T11762] loop1: detected capacity change from 0 to 2048 04:07:06 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b", 0x90}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:06 executing program 2: syz_io_uring_setup(0x32b6, &(0x7f0000000000), &(0x7f00007ff000/0x800000)=nil, &(0x7f0000804000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 04:07:06 executing program 1: syz_read_part_table(0x5cb, &(0x7f0000000000)="$eJzs2z9I3GcYB/Dnzh6BBJolU7rEDBlKloaMPWgSzjMhgeMSl5AhgYQSctMFAhd6EEgGvUHxBnF0EeEW/0yeNzgURcFZxMEiOLi06CJ06RXxtZNDrdpS+Hzg5eF93+/dcw/cb/wF/2vZ+K3b7WYionvp9J8eaBX6Ht4o3Ss/i8jEi4jo/fnr2cObTEocf+vNtN9K+8mJy52h/f5ca/Ppwa2XS41suv+U1pWp9sCZh+PCTeeXr37+Ui0O1/JvN4r1ncH1tScze4Vy+3GjOfso9+B1yq2kevy/eB+1+Bjv4lVUohJvonraxt+c3H+8td0T14ut+R+//72vM7J4J8VL5zDrSf7q33/U/0Pv6PNm/f7tuWtjd2sLq+XdnqNc5R88XQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/Pum88tXP3+pFodr+bcbxfrO4Prak5m9Qrn9uNGcfZR78DrlVlL9KtX3UYuP8S5eRSUq8Saq59R/vLX93R/Xi635bER0RhbvpFzpjHP+3f4fekefN+v3b89dG7tbW1gt7/Yc5SqXLugHAAAAAAAAAAAAAAAAAAAAQEQU+h7eKN0rP4vIxIuI+PbXn7KH5930vnsm4ofDejPlt9L55MTlztB+f661+fTg1sulxi/p/FNaV6baA//FPJzOnwEAAP//i2GSlQ==") 04:07:06 executing program 3: getgroups(0x2, &(0x7f0000001680)=[0x0, 0x0]) 04:07:06 executing program 3: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, r0+60000000}, &(0x7f0000000240)={&(0x7f0000000200)={[0x4]}, 0x8}) 04:07:06 executing program 2: epoll_pwait2(0xffffffffffffffff, &(0x7f0000001e40)=[{}], 0x1, 0x0, 0x0, 0x0) [ 560.636304][T11771] loop1: detected capacity change from 0 to 2048 04:07:06 executing program 2: io_uring_setup(0x0, &(0x7f0000000000)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x2032, 0xffffffffffffffff, 0x8000000) [ 560.750723][T11783] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 04:07:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b", 0x57}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:06 executing program 1: syz_read_part_table(0x5cb, &(0x7f0000000000)="$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") 04:07:06 executing program 2: io_uring_setup(0x0, &(0x7f0000000000)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x2032, 0xffffffffffffffff, 0x8000000) [ 560.810882][ T5498] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 560.832999][T11783] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 560.876595][T11783] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) [ 560.995599][T11787] loop1: detected capacity change from 0 to 2048 04:07:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000002c0)={@mcast1}) 04:07:07 executing program 2: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000200)='(%}!(-\\::!*$\r.--_,})!@&%&$--.}-\x00'], 0x0, 0x0) 04:07:07 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 04:07:07 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a", 0x92}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d", 0x83}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:07 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 04:07:07 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x40}, &(0x7f00000000c0)) 04:07:07 executing program 1: openat$incfs(0xffffffffffffffff, &(0x7f0000001900)='.log\x00', 0x0, 0x0) 04:07:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80c00) 04:07:07 executing program 2: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000200)=""/38) [ 561.981253][T11814] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 561.994086][T11814] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 562.013327][T11814] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:07 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 04:07:08 executing program 3: msgsnd(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) 04:07:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x5}]}}, &(0x7f0000000140)=""/132, 0x26, 0x84, 0x1}, 0x20) 04:07:08 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 04:07:08 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:08 executing program 2: syz_io_uring_setup(0x3a2c, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 04:07:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000c40)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), r0) 04:07:08 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x200, 0x4) 04:07:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a", 0x92}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d", 0x83}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:08 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x928c1, 0x0) [ 562.748604][ T1241] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.755231][ T1241] ieee802154 phy1 wpan1: encryption failed: -22 04:07:08 executing program 1: syz_io_uring_setup(0x12b0, &(0x7f0000000100), &(0x7f0000afe000/0x4000)=nil, &(0x7f0000d91000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 04:07:08 executing program 3: add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='<', 0x1, 0xffffffffffffffff) 04:07:08 executing program 1: syz_io_uring_setup(0x12b0, &(0x7f0000000100), &(0x7f0000afe000/0x4000)=nil, &(0x7f0000d91000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 562.915447][T11846] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 562.928447][T11846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 562.940024][T11846] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:08 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x928c1, 0x0) 04:07:08 executing program 3: add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='<', 0x1, 0xffffffffffffffff) 04:07:09 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:09 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$VHOST_VDPA_GET_VQS_COUNT(r0, 0xc020660b, 0x0) 04:07:09 executing program 3: openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder-control\x00', 0x0, 0x0) 04:07:09 executing program 1: select(0x40, &(0x7f00000003c0), &(0x7f0000000400)={0x5}, &(0x7f0000000440)={0x7}, &(0x7f0000000480)) 04:07:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d", 0x83}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a", 0x92}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:09 executing program 3: name_to_handle_at(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 04:07:09 executing program 1: socketpair(0x3c, 0x0, 0x0, &(0x7f00000000c0)) 04:07:09 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0045878, 0x0) 04:07:09 executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x2}, 0x0) 04:07:09 executing program 2: r0 = msgget(0x1, 0x0) msgrcv(r0, 0x0, 0x0, 0x1, 0x0) 04:07:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000ec0), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 563.899510][T11875] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 563.912230][T11875] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 563.978100][T11875] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:07:10 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000010c00000000000000000000f37b3fb727008cb27cbdf183afb400"], 0x40}], 0x1}, 0x0) 04:07:10 executing program 3: sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x0) 04:07:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYBLOB], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x3, &(0x7f0000000fc0)=@framed, &(0x7f0000001000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)}, 0x80) 04:07:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a426b", 0x94}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d81885735daf4e4b8a8859b753aba166be2ee3478ba01ec50a8e91eb97f34ba5b5579060dbf2f2bc430f04355954492614a4968ae96c4477aee264da59e1014c428ff54a105d89db98489f99d0f381c897754d3ee026e018e1399377097764e5ce4ac", 0x99}, {&(0x7f0000000480)="5cc1aa7e480b679e3a42e725b597dd00933fcab87e4aa6719c67bb0d39ecc3a95331be29618bb2e35b22ad5b540fa191b317dcf7bf5775f2d05b2b4c5f4223a45d352ef74a7f91efb403bacf980868a0f330bd2143b0cb4ce57542e8c0244d00bf6ac30a86131c", 0x67}, {&(0x7f0000000500)="0455508c56f25aedf6b145a22fb88b2afa05bde605d40c7f267a3df942ae98dee36e46f971ac6db78262c46d0f45c02fd3a4e009d5331c2b41a2ee3e0dd7420e2147afe807dcb2fa5d4471", 0x4b}], 0x5, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) read$alg(r1, &(0x7f0000001e00)=""/4108, 0x100c) 04:07:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/216, 0xd8) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)="3d0e507e7f5dac17b76324b3b73defa9201f69d179964fdc07b4feefae26b44e33d0c23a35950e376b8cefe7cd95c72303d3f761c4907ea6cfdf9e92970587d441d9ea8d0ff22620bb4643116cf215aeda710612a82dcf1a0819a598e1ffb151d27eaee3d00bbff16e273423601eb51d928684b9ba1e05bb4d1a22b18028ee9dc6973c573dab9b5c49f2be139defce4b334a42", 0x93}, {&(0x7f00000001c0)="0d7850469b4ebc07d6e36eeb58", 0xd}, {&(0x7f00000003c0)="b6d8baf1833a035765f80654496e6dd8211f286810858bd508ec512be781ea480a3673f68823124d4a8b937cb9f511cada48193b50d13d", 0x37}], 0x3, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) 04:07:10 executing program 3: readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/97, 0x61) 04:07:10 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000100)=0x20c080, 0x4) 04:07:10 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x4012831, 0xffffffffffffffff, 0x0) 04:07:10 executing program 3: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 04:07:10 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000100)=0x20c080, 0x4) [ 564.843988][T11904] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 564.880538][T11904] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 564.912299][T11902] BUG: unable to handle page fault for address: fffffbc0000001d8 [ 564.920079][T11902] #PF: supervisor read access in kernel mode [ 564.926092][T11902] #PF: error_code(0x0000) - not-present page [ 564.932120][T11902] PGD 23ffe4067 P4D 23ffe4067 PUD 0 [ 564.937536][T11902] Oops: 0000 [#1] PREEMPT SMP KASAN [ 564.942766][T11902] CPU: 1 PID: 11902 Comm: syz-executor.2 Not tainted 6.1.0-rc5-next-20221116-syzkaller #0 04:07:10 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)="9f61") syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000008c0)='\aD') syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001bc0)='Mn') [ 564.952792][T11902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 564.962878][T11902] RIP: 0010:vmx_handle_exit_irqoff+0x338/0x750 [ 564.969120][T11902] Code: 00 01 be 01 03 00 00 48 89 ef e8 63 73 e8 ff e9 96 fd ff ff e8 f9 b1 5f 00 48 89 e8 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 <0f> b6 0c 10 48 8d 45 01 48 89 c6 48 c1 ee 03 0f b6 14 16 48 89 ee [ 564.988767][T11902] RSP: 0018:ffffc9000c0a7b08 EFLAGS: 00010806 [ 564.994872][T11902] RAX: 1fffffc0000001d8 RBX: ffff88801ceca7c0 RCX: ffffc900049f6000 [ 565.002884][T11902] RDX: dffffc0000000000 RSI: ffffffff8120f2e7 RDI: 0000000000000005 [ 565.010895][T11902] RBP: fffffe0000000ec0 R08: 0000000000000005 R09: 0000000080000000 [ 565.018896][T11902] R10: 0000000080000000 R11: 0000000000000000 R12: 00000000800000ec [ 565.026883][T11902] R13: 0000000080000000 R14: ffff88801ceca7f8 R15: 0001000000000000 [ 565.034873][T11902] FS: 00007fa069369700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 565.043816][T11902] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 565.050501][T11902] CR2: fffffbc0000001d8 CR3: 00000000297c6000 CR4: 00000000003526e0 [ 565.058496][T11902] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 565.066476][T11902] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 565.074471][T11902] Call Trace: [ 565.077764][T11902] [ 565.080706][T11902] vcpu_enter_guest+0x3539/0x6100 [ 565.085773][T11902] ? lock_release+0x810/0x810 [ 565.090516][T11902] ? kvm_check_nested_events+0x100/0x100 [ 565.096177][T11902] ? lock_downgrade+0x6e0/0x6e0 [ 565.101060][T11902] ? kvm_arch_vcpu_ioctl_run+0x1ac7/0x2b90 [ 565.106899][T11902] ? kvm_arch_vcpu_ioctl_run+0xa84/0x2b90 [ 565.112643][T11902] kvm_arch_vcpu_ioctl_run+0xa84/0x2b90 [ 565.118224][T11902] kvm_vcpu_ioctl+0x574/0xfc0 [ 565.122928][T11902] ? kvm_release_pfn_dirty+0x220/0x220 [ 565.128419][T11902] ? xfd_validate_state+0x5d/0x180 [ 565.133543][T11902] ? __fget_files+0x26a/0x440 [ 565.138261][T11902] ? bpf_lsm_file_ioctl+0x9/0x10 [ 565.143268][T11902] ? kvm_release_pfn_dirty+0x220/0x220 [ 565.148754][T11902] __x64_sys_ioctl+0x197/0x210 [ 565.153551][T11902] do_syscall_64+0x39/0xb0 [ 565.158006][T11902] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 565.163953][T11902] RIP: 0033:0x7fa06868c0d9 [ 565.168376][T11902] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 565.187996][T11902] RSP: 002b:00007fa069369168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 565.196422][T11902] RAX: ffffffffffffffda RBX: 00007fa0687ac050 RCX: 00007fa06868c0d9 [ 565.204485][T11902] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 565.212467][T11902] RBP: 00007fa0686e7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 565.220451][T11902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 565.228429][T11902] R13: 00007ffe06b9ae9f R14: 00007fa069369300 R15: 0000000000022000 [ 565.236417][T11902] [ 565.239436][T11902] Modules linked in: [ 565.243340][T11902] CR2: fffffbc0000001d8 [ 565.247500][T11902] ---[ end trace 0000000000000000 ]--- [ 565.252955][T11902] RIP: 0010:vmx_handle_exit_irqoff+0x338/0x750 [ 565.259140][T11902] Code: 00 01 be 01 03 00 00 48 89 ef e8 63 73 e8 ff e9 96 fd ff ff e8 f9 b1 5f 00 48 89 e8 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 <0f> b6 0c 10 48 8d 45 01 48 89 c6 48 c1 ee 03 0f b6 14 16 48 89 ee [ 565.278758][T11902] RSP: 0018:ffffc9000c0a7b08 EFLAGS: 00010806 [ 565.284837][T11902] RAX: 1fffffc0000001d8 RBX: ffff88801ceca7c0 RCX: ffffc900049f6000 [ 565.292816][T11902] RDX: dffffc0000000000 RSI: ffffffff8120f2e7 RDI: 0000000000000005 [ 565.300881][T11902] RBP: fffffe0000000ec0 R08: 0000000000000005 R09: 0000000080000000 [ 565.308885][T11902] R10: 0000000080000000 R11: 0000000000000000 R12: 00000000800000ec [ 565.316862][T11902] R13: 0000000080000000 R14: ffff88801ceca7f8 R15: 0001000000000000 [ 565.324840][T11902] FS: 00007fa069369700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 565.333780][T11902] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 565.340369][T11902] CR2: fffffbc0000001d8 CR3: 00000000297c6000 CR4: 00000000003526e0 [ 565.348351][T11902] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 565.356331][T11902] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 565.364340][T11902] Kernel panic - not syncing: Fatal exception [ 565.370471][T11902] Kernel Offset: disabled [ 565.374795][T11902] Rebooting in 86400 seconds..