, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x18Coa\xd4Q\v\x19\x00'}}) 18:42:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x2000000000000163, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r1 = accept4(r0, &(0x7f00000000c0)=@nfc, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140), &(0x7f0000000180)=0x4) 18:42:54 executing program 4: ioprio_set$pid(0x1, 0x0, 0x5) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe289958afd08755c, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:42:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xfee78c91d33fd46f, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:42:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a80000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="204001000000000008001b000000000080002b007c00010026ca5ad100"/88, @ANYRES32=0x0, @ANYBLOB="0b0880da77b4a5f9439eee1151cdc16ffa03c3e0cc4d62c4a91ed5fdc2a425e7bacd8831e7e28e01b3c34e733728fbf817b6280b5dde18eda753d6f562be30e3997fd9051a28fd237187f74acb8d", @ANYRES32, @ANYBLOB="080000000000000000000000000000001000"/32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xa8}}, 0x0) [ 2639.033418][T24502] could not allocate digest TFM handle tgr128-genericCoaQ  [ 2639.044419][T24488] could not allocate digest TFM handle tgr128-generic P0^c [ 2639.122573][T24694] could not allocate digest TFM handle tgr128-genericCoaQ  [ 2639.183857][T24687] could not allocate digest TFM handle tgr128-generic P0^c 18:42:55 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x161}}, 0x40008088) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x12, r5, 0xfffffffb000) r6 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r6, 0x0, 0x20000000003, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x4, @remote, 0x10000}, @in={0x2, 0x4e24, @multicast1}], 0x2c) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r7 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x20000000003, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000002}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81dab9b9a2ea27a0}, 0x8a4) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000280)=""/215) 18:42:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x0e>A\x14\xab\x7f\x13 \x00'}}) 18:42:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\"k\xc3Vk\xb2<\x19\x00'}}) 18:42:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xfeed446f932d815c, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe291d7bc1bec067b, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2639.780246][T24747] could not allocate digest TFM handle tgr128-generic>A [ 2639.833358][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2639.890777][T24860] could not allocate digest TFM handle tgr128-generic>A 18:42:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xc2\x1d\xd8\xf7\xf8\xd1) \x00'}}) 18:42:55 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) sched_setparam(r0, &(0x7f0000000300)=0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d000018000000000000000000000004000300000000000000000000000000000000000000000000000000eeff0000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ac1e00010000000000000000000005000500000000000a00000000000000d4e203e12a324cad04c3e6b928b0b970000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff00"/192], 0xc0}}, 0x0) r2 = gettid() capget(&(0x7f0000000000)={0x19980330, r2}, &(0x7f0000000180)={0x5, 0x0, 0x5, 0x0, 0x3, 0x2}) sched_setattr(r2, &(0x7f0000000380)={0x38, 0x2, 0x40, 0x0, 0x3c, 0x81, 0x7ff, 0x6, 0xd4, 0xffffff01}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, &(0x7f0000000340)={0x100}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(r5, 0x0, r7, 0x0, 0x20000000003, 0x0) r8 = socket$packet(0x11, 0x2, 0x300) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x800) splice(r11, 0x0, r13, 0x0, 0x20000000003, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r16 = accept4(r15, 0x0, 0x0, 0x0) splice(r14, 0x0, r16, 0x0, 0x20000000003, 0x0) bind$packet(r16, &(0x7f0000000500)={0x11, 0xd, r10, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0xb5) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9c0000002c00d594f29d0000f27796187bef1fb9", @ANYRES32=r17, @ANYBLOB="0000000000000000210000090a00010072737670360000006c000200400005003c0001000301040000c243285428eda40100000007004884c20af7d6cabeb87f0005000400ffffffff2001b1334000ffff0300000005000000ba3affff620b000014000300fe8000000000000000000000000400bb14000300fe88000000000000000000000000000169125264e7ed0000000000000059bfab0c9df615a137d1bfb704516160b15d6f9fef8431f14d7f3389d41b8b4cb721afa37d727b4f4ae7ed386b09fa97e0e0c94f7c651ef3a8cd01d73527abeca823b64a64361a03eea8b9559087360afd410413b78fdc2f7b8266a6b3547b0fa466317ce3188cddf87bd14e465ada0158b95d60f4b9a1c62e8e1975978b3b75d2c554401790409f8f7945b3fcee3add19ab1cadd2e80881dd605440e495a33804feebac4b12024a0d80ac5178fc9192990329ef02c30e167c993de813dccd41fa696be55891662f2139060d0d4e08cecd9474adae34dcfe84e7d934be40475ff3e57738e15a71a92e96d71ab8bd5db91f2d0101681ead1c867dc67dd7930ef6f872f724ef57fe1f92588c91efd0ac60d30a92c4aad200566bbd42883f93a87f29530f2192fa7ee4f0e9f2d4ef2601000000de6591db17063de7bbeeefe0fbc6f5367c5b755b99d464628c0f0ac4cbc72ccdde9a5c6ebc6586b81a13463938e669ef93a85402a274f083d3dfafdc094bd1557004a3a2a91d3785a3255c22b68200fd2ec7f6e539369d36f6085c1ab70a2264950aefdbe594614dee87639984a19a3fcde35db083a9a1622c5675ccee766f647ea592c25c90359936406c67950e55aa7886ceb55d22b969affe7aa6c733ecf90275e3eea695f0f9c9a4ee83ff075721d6eeafee8bc527f0e984fd6d0ff0efcefd84fa134e923b599f008c919ae617e4ee54c84f0987644f3d69e3ceb3946c7b501ce300fd732675d79314848580f343ff149db606f81d89ca5d68ccdfa242a493b043c5c3805b22129477afb2b89309bc644d76a4000000006e52fa0053111099a80a4b69b292b0fa23ee3e1727c5dcef1e6d105b6bf0f04b6c90e773c7f67d99ece98fb05f8e9750f26815a5bcc5bc5c1083e8525da67d3bce3184865a69de9cb8554ec022366230b2cdc3dfd7e129ee39c83b34a70b75eab513d281a9a833e0d74d63e7a8d764acc363b5fe6ecc55bc2a5518da1d3f3627de6a30b79da27f7ba45475c188e2ce45ae7d029bdfcd6fa0b10326bdfcbac1de37a701bca0171f"], 0x9c}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_getlink={0x20, 0x12, 0x400, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, r17, 0x1000, 0x4008}}, 0x3cd}, 0x1, 0x0, 0x0, 0x40000}, 0x80) setuid(r4) r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r19) r20 = getgid() r21 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r21, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000400)=ANY=[@ANYBLOB="020d0000180000000000000000000000040003000000000000000000000020cc0b0346c28e9b5700000000000000000000000008001200000003000000000000000000060000b9fb000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000005000500000000000a0000000000000000000000000000000000ffffac141440000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff00"/201], 0xc0}}, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100020000000000020093dc", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r19, @ANYRES64=r21, @ANYRES32=r20, @ANYBLOB="0011c362", @ANYRES32, @ANYBLOB="10000000000000002000070000000000"], 0x9, 0x3) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2640.032299][T24751] could not allocate digest TFM handle tgr128-generic"kVk< 18:42:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xff052379409f536d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:42:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\x00\x80=\x8ay\x19\x00'}}) [ 2640.177715][ C0] net_ratelimit: 17 callbacks suppressed [ 2640.177725][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.189393][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe2979569d87cbd66, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:42:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xff185948d58a31a2, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2640.487677][T25064] could not allocate digest TFM handle tgr128-generic) [ 2640.565950][T25093] could not allocate digest TFM handle tgr128-generic) [ 2640.567697][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.579383][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.585293][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.591188][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.657708][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.663739][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2641.078327][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2641.127711][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2641.127720][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2641.238228][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2641.378358][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2641.588627][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2641.798224][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2641.948433][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2642.169089][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2642.568366][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2642.778366][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2643.294071][T24735] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.301418][T24735] bridge0: port 1(bridge_slave_0) entered disabled state [ 2643.309814][T24735] device bridge0 left promiscuous mode [ 2644.963014][T24735] validate_nla: 14 callbacks suppressed [ 2644.963025][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.048449][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.287714][ C1] net_ratelimit: 22 callbacks suppressed [ 2645.287723][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.287760][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.293449][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.330727][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.418289][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.610183][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.698289][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.706699][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.918517][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2646.108051][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2646.248336][T24735] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2646.407746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2646.413587][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2646.807784][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2646.813856][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2646.819925][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2646.825970][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2646.897810][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:03 executing program 0: ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0xb0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x0, 0x4000, 0x4ad4f552}, r0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) r3 = socket(0x10, 0x80002, 0x0) ioctl$sock_ifreq(r3, 0x8910, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_flags}) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x6c) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r7, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000380)={r8, 0x9, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={r8, 0x7fff}, &(0x7f0000000140)=0x8) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x2) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000000)) 18:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe2c31b7d7212fa29, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:03 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x12a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x24a1, 0x80) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={{0x2, 0x0, @identifier="394706b12589adec0d403893b8d83403"}}) perf_event_open(&(0x7f0000000040)={0x23de6ffdf381da50, 0x70, 0xff, 0x0, 0x8, 0x6, 0x0, 0x1, 0x4002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x2, @perf_config_ext={0x7ff, 0x22000}, 0x8, 0x7, 0x0, 0xb1875d1389e2d288, 0x8, 0x401, 0x8cf}, 0xffffffffffffffff, 0x6, r0, 0x4) 18:43:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xff29bbacaf549a21, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericL\xde\xe4\xbbL\a~\x19\x00'}}) 18:43:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x8e\xd0\x04it_4 \x00'}}) 18:43:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x7f499eb2ae778c31}) timerfd_settime(r1, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) dup3(r3, r2, 0x80000) write(r2, &(0x7f0000000140)="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"/297, 0x3accf8d5) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xd}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) [ 2647.771520][T25119] could not allocate digest TFM handle tgr128-genericLL~ 18:43:03 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) write$P9_RSTATu(r0, &(0x7f0000000100)={0x93, 0x7d, 0x1, {{0x0, 0x7e, 0x8000, 0x800, {0x8, 0x2, 0x1}, 0x0, 0x230, 0x0, 0x3, 0x7, 'selinux', 0x26, ')vboxnet0)selinuxsystem^- @vmnet1@bdev', 0x14, 'ppp1bdevGPL^eth0GPL\\', 0xa, '\\]userem0!'}, 0x0, '', r2, r3, r5}}, 0x93) 18:43:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xff6950fc15d18d04, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2647.869996][T25118] could not allocate digest TFM handle tgr128-genericit_4 18:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe2e8cbd61d976acd, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2647.958057][T25343] could not allocate digest TFM handle tgr128-genericit_4 18:43:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic!T\xbd7\x98\xcd\xa7\x19\x00'}}) 18:43:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x0e\r\xf5\x1a\xfa\xa5; \x00'}}) 18:43:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xff894be88331ac92, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:04 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000040)='keyringproc\x00', 0x2, 0x2a, &(0x7f0000000080)={0x5, 0x1, 0x3, 0x2}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x0, 0x0, 0xffffffffffffffff}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x2000000000000045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x7, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f00000000c0)="6daac7d40d43a3ab3698eef4791d54932e4f6f03d9081caf0d04c960762f019e52eadf32fd1d00c98cb09ac1e2f6ab890d65743380c0a2df43458863517cfe0516bcff2ec1f37ac8b597e19fa7ab592a357de0e41b3e9425f78945cb5ec88d9b1a4539bbba9f1d86e24d784eb3d0a7a0044615bad74b61451a7cd1063c49707278719828c85b7147f4f2071b4d20eb5a6917ecb9ae0bb9cbd634c65762eaf63f452a4ecbb37d22e0135a41b80f834197b1b7", 0xb2}, {&(0x7f0000000180)="4f60cfccf23a94c375575e9cff520accdb9cfc8b4cd50aae8f438e9c73ff6ab145f6c6e323c70c2ddae6dcab19a6d1ee1b06d146eb4645f85ed7d48a491c07ad3dd295c7012d571288c2bd5e52c1f150229d794c06d9892508322b5d5564c44843ff5f31a1f0e25b851ede0743fd6cb48e30e9a6b5616548104732d30ae3898cdd49d597b7b3c8e7542a23de79192d1128", 0x91}, {&(0x7f0000000280)="ac189decbd3f0a03f7571b6e11a61bb1d19da9cbaa372c131e64ac5fd88fbea426ed0b42d894db9560f06e7e8c9c7eda8e659d393b601ab0773d76dca3777bf1d2966d3202735ea3aca5", 0x4a}, {&(0x7f0000000300)="a604ffad0ddb2a85b1524ff4dd4d4fb7172035c8f00ff61d37dd791bb1dd71d390c076a2f691ef74c378b080e4a4d826c5d6eaa81d660dbb0fc151cb9ed93845cc3aadf0dee058f800c72503f16e6187e9f607dfd68f97d9d98795d7094e3ae8d10de780cf5ce7c20029796c0460016628d19fc11ca956c6c72389a41ba007668200e30a191da6c1a524f7e4cc95498191c5a34fa83e4d144b4838ab3418", 0x9e}], 0x4) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000000)={{0x80, 0x7, 0x9, 0x4, 0x7, 0x2}, 0x2, 0x6, 0x6}) [ 2648.573549][T25359] could not allocate digest TFM handle tgr128-generic!T7ͧ 18:43:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe2ef273672d5da00, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2648.684040][T25451] could not allocate digest TFM handle tgr128-generic ; 18:43:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic|\xe8\x00\x93\xaeb\xbd\x19\x00'}}) [ 2648.788689][T25545] could not allocate digest TFM handle tgr128-generic ; 18:43:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7008a00000010002f0000000000000027000000000000009500000000000000"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x82000, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x2, 0x2, 0x4}, 0xffffffff}}, 0x18) recvfrom$inet(r1, &(0x7f0000000080)=""/130, 0x82, 0xc0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 18:43:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic+`V\xd2\x11&> \x00'}}) 18:43:04 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xffd0fff92395fc79, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe2f41a90dd9c709e, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2649.241410][T25700] could not allocate digest TFM handle tgr128-generic+`V&> [ 2649.281953][T25677] could not allocate digest TFM handle tgr128-generic| 18:43:05 executing program 0: r0 = socket(0x10, 0x20000000080003, 0xc) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r5, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0xffffffffffffffff, 0x2, 0x8}, 0xc) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f00000002c0)={0x9e0000, 0x80000000, 0x4, r6, 0x0, &(0x7f0000000280)={0x9d0903, 0x7, [], @ptr=0x5}}) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000002}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xcc, r4, 0x300, 0x70bd2a, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x1}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4004980}, 0x40000) [ 2649.351993][T25859] could not allocate digest TFM handle tgr128-generic+`V&> 18:43:05 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0xff, 0x4) 18:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericf\xd3\x82\x9d\x81 \xd4\x19\x00'}}) 18:43:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xce\xd8\x8c\x11\xfc\xf4D \x00'}}) 18:43:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xffd526d78cf47f42, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe304773317f8ca7c, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:05 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x20000000003, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="66ba610066b8838366efb9260200000f32c4a1251546e4b805000000b9762d00000f01d9b805000000b90f0000000f01d966b83e010f00d0460f4703260f5d1ec744240004000000c744240208000000c7442406000000000f011c24c4e1fa2d29", 0x61}], 0x1, 0x5, &(0x7f00000001c0)=[@cstype0={0x4, 0xf}, @cstype3={0x5, 0xc}], 0x2) stat(0x0, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getgid() fsetxattr$system_posix_acl(r5, &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000480)=ANY=[@ANYBLOB="020d000018000000000000000000000004000300000000000000000000000000000000000000000000000000000000000800120000000300000000b9000000000600000000000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000005000500000000000a00000000000000000000000000000006000000ac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff000000000000000098f4bca4d22395"], 0xc0}}, 0x0) getsockopt$sock_timeval(r7, 0x1, 0x14, &(0x7f0000000200), &(0x7f0000000440)=0x10) bind$alg(r6, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r8 = accept$alg(r6, 0x0, 0x0) sendfile(r8, r0, 0x0, 0x80000000) 18:43:05 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x44) prctl$PR_GET_SECUREBITS(0x1b) write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x18, 0x4, 0x8}}, 0x14) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000080)={0x9, 0x2dcc, [0xb7, 0x0, 0x7f, 0xff80, 0x4], 0x8}) [ 2649.961951][T25941] could not allocate digest TFM handle tgr128-generic،D [ 2649.974113][T25937] could not allocate digest TFM handle tgr128-genericfӂ  [ 2650.093961][T26163] could not allocate digest TFM handle tgr128-generic،D 18:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericI;`\a\xccf\x00\x1a\x00'}}) 18:43:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x1f\xf0c^\x0e0P \x00'}}) 18:43:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="66b91f0b000066b80000008066ba000000000f300f60f10f01cb660f38803e79776765f3a4e384da090f18c5660f38df2f0f2051"}], 0x1, 0x0, 0x0, 0x30b) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff76, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11d000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x196, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001040)) msgctl$IPC_RMID(0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r3, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000040)={0x2, 0x380, 0x95cb, 0x4}) 18:43:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xffdbf173c86dd281, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe320716be5de4f3d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:06 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0xfffffffffffffff9, 0x5}) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) [ 2650.567744][ C0] net_ratelimit: 14 callbacks suppressed [ 2650.567753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2650.579297][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2650.644054][T26364] could not allocate digest TFM handle tgr128-genericc^0P [ 2650.726016][T26301] could not allocate digest TFM handle tgr128-genericI;`f [ 2650.764966][T26429] could not allocate digest TFM handle tgr128-genericc^0P 18:43:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\v\xba\xb8{tpY \x00'}}) 18:43:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x8a\x9a\x1f\x1a)\x1f1\x1a\x00'}}) [ 2650.967745][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2650.973621][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2650.979572][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2650.985389][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:43:06 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)) prlimit64(r0, 0x0, &(0x7f00000001c0)={0x51b, 0x7f}, 0x0) getpid() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000100)={'veth0_t*_bond\x00', @ifru_map={0xffffffff, 0x3f, 0x6, 0x0, 0x4, 0x5}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000300)=[{&(0x7f0000000080)=""/248, 0xf8}], 0x1, &(0x7f0000121000), 0x0, 0x0) getpriority(0x0, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) socket$l2tp(0x18, 0x1, 0x1) r4 = socket(0x10, 0x0, 0x0) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000540)=""/154, 0x9a}], 0x6, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000001fc0)=ANY=[@ANYRES32=r5]) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x313000, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r6, 0xc0345642, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @dev={0xfe, 0x80, [], 0x2b}, 0x0, 0x0, 0x1766, 0xb00, 0x0, 0x80060125}) socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 18:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe32c78f27195aa17, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xffe210c9e2217d93, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:07 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x20000000003, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast6)\x00'}, 0xfffffffffffffeea) r5 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000000)=0x3, 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) splice(r6, 0x0, r8, 0x0, 0x20000000003, 0x0) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='\x00dTv/st\x00', 0x8080, 0x0) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r12, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="02fd44c0aeebbd84f8b996f469d394b84b3bf292c4a45d14e65660ec66e9244b6fa73d0849f14af78cddabcc77f8c7793a95d100"/63, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x7a, &(0x7f000059aff8)={r13}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r9, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[@ANYRES32=r13, @ANYBLOB="f300000080000000b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"], &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000180)={r13, @in6={{0xa, 0x4e23, 0x1, @ipv4={[], [], @multicast1}, 0x4}}, 0x101, 0x9, 0x101, 0x8, 0x4a, 0x7, 0x7}, &(0x7f00000000c0)=0x9c) [ 2651.426576][T26619] could not allocate digest TFM handle tgr128-generic {tpY [ 2651.527780][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.527828][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.533809][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.539512][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.558420][T26701] could not allocate digest TFM handle tgr128-generic {tpY [ 2651.669864][T26623] could not allocate digest TFM handle tgr128-generic)1 [ 2651.720333][T26631] could not allocate digest TFM handle tgr128-generic)1 18:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3333a4c90eb0c4e, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xffffff7f00000000, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericT\xa2p\xbcw\xd8^ \x00'}}) 18:43:07 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x48000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80088000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xbc, r1, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x34cc}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1d1e}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffff7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @loopback}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x20000, &(0x7f00000000c0)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid={'afid', 0x3d, 0x1}}], [{@dont_measure='dont_measure'}]}}) 18:43:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x96\xd6\x8fR\xabMJ\x1a\x00'}}) 18:43:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x4, 0x8000008, 0x10fff, 0x0, 0x0}, 0x28) [ 2652.396016][T26861] could not allocate digest TFM handle tgr128-genericTpw^ 18:43:08 executing program 4: r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x0, 0xe672, 0x3}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) socket$kcm(0x29, 0x7, 0x0) ioprio_set$pid(0x1, r1, 0x400c0ea) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$FBIOPAN_DISPLAY(r2, 0x4606, &(0x7f0000000080)={0x60, 0x800, 0x556, 0x400, 0x7f, 0x9, 0x10, 0x1, {0x8000}, {0x3, 0x1f}, {0x9, 0x81}, {0x0, 0x1}, 0x0, 0x50, 0x4, 0x1f, 0x1, 0x8, 0x1, 0x4, 0x9bc, 0x2, 0x2, 0x2, 0x1, 0x104, 0x1, 0x10}) 18:43:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr1\x0f8-generic\x00'}}) [ 2652.487960][T26981] could not allocate digest TFM handle tgr128-genericTpw^ [ 2652.506283][T26866] could not allocate digest TFM handle tgr128-generic֏RMJ 18:43:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3366d38bf2343a6, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xd7\x91\x91uR\xb1n \x00'}}) 18:43:08 executing program 0: 18:43:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x1e\xf23\x81\x9b[i\x1a\x00'}}) 18:43:08 executing program 0: 18:43:08 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000180)={0x5, 0x4, 0x4, 0x4, 0x400, {0x0, 0x7530}, {0x0, 0x12, 0x0, 0x5, 0x1, 0xcc, "11136db0"}, 0x80000001, 0x7, @planes=&(0x7f0000000080)={0xffff, 0x2, @mem_offset=0x4, 0x7}, 0x4, 0x0, 0xffffffffffffffff}) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e24, @remote}, {0x2, 0x4e21, @multicast1}, 0x100, 0x0, 0x0, 0x0, 0xfffb, &(0x7f0000000200)='yam0\x00', 0x9, 0x4, 0x1ff}) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="140000001300197f048c590388ff77902611bc21", 0x14}], 0x1) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x20000000003, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000000)={{0x89, 0x3f}, {0x5, 0x1}, 0x8, 0x8d1f0c821e72212, 0x6b}) [ 2653.058223][T27004] could not allocate digest TFM handle tgr128-genericבuRn 18:43:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x40, 0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020f0001020000004773fd47a2023b08"], 0x10}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0xe0, 0x4) recvmmsg(r0, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) [ 2653.109944][T27006] could not allocate digest TFM handle tgr18-generic [ 2653.144035][T27122] could not allocate digest TFM handle tgr128-genericבuRn 18:43:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe372272d633b16e6, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2653.223665][T27065] could not allocate digest TFM handle tgr128-generic3[i [ 2653.259267][T27045] could not allocate digest TFM handle tgr18-generic 18:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xe7\x13\xad\xb1?\xf2| \x00'}}) 18:43:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x02\x00'}}) 18:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\r\x9a\x06\x9b|\xc2w\x1a\x00'}}) 18:43:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f00000000c0)={@loopback}, 0x14) [ 2653.817039][T27314] could not allocate digest TFM handle tgr128-generic?| 18:43:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe37771d1371762be, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2653.942963][T27383] could not allocate digest TFM handle tgr128-generic?| 18:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\t\xdf\xf6\xb8\xb6\x85 \x00'}}) [ 2654.001286][T27337] could not allocate digest TFM handle tgr128-generic |w 18:43:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0xfd7b, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x83232, 0xffffffffffffffff, 0x0) r5 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB], 0x1}}, 0x48000) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") close(r2) 18:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xd3\xa7\x06\xdc\xb2\x9c|\x1a\x00'}}) [ 2654.217771][T27373] could not allocate digest TFM handle tgr128-generic [ 2654.412145][T27423] could not allocate digest TFM handle tgr128-generic 18:43:10 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x03\x00'}}) 18:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x86\x13B\x0e\x92\xb6\x90 \x00'}}) 18:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe37ca287b906a6e0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="020f0001020000004773fd47a2023b087b6806cecaf2929c4ab5c46166036466fc70c62f69fbd60462f3ef77f6a8719280bd33ae926764"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10022, 0x0) 18:43:10 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2654.801009][T27494] could not allocate digest TFM handle tgr128-genericӧܲ| 18:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xa4=\x8b\n\x1d|\x86\x1a\x00'}}) [ 2655.084789][T27607] could not allocate digest TFM handle tgr128-genericB [ 2655.182762][T27712] could not allocate digest TFM handle tgr128-genericB 18:43:11 executing program 0: 18:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3830a24af332eb4, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2655.248724][T27619] could not allocate digest TFM handle tgr128-generic 18:43:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xdb\xb7ny\x80\x1b\xb8 \x00'}}) 18:43:11 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='.\x00', 0x7, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="2579407c45c2ee8a62206adb209e501ee239b7ca3e2b610f129dc26d61084323048267965d6c2ca253a03031e311a09f7f3e466c6886a164b01a377281e1e9bb849dc436799913c9ade104a358a0576f4669a4576f8a6c381589eed8db103b7dba96a412421a476a175610e06456052c597cbf6a29a5a72272af9a44d7f8c36713ed", 0x82, 0xffff}, {&(0x7f0000000140)="a2783551465095", 0x7, 0xffffffff00000000}, {&(0x7f0000000180)="03d8be382395efa0c0b31bf3d898b928be2e915cbf81b3a9686e1509fee102f179f7b2746fba48a89cf88f3ab10a821fa59080e9b95b4b155ba7365ee966b52de357d658146dca94b4a8e5af9e0837fba5f683ba227b4c8963b90f54fda7df3c2519c42a2602c2a17f7c6d3b68e5822803583dda26b76a44a60717506c50b8cf923b878ffe84c1dcd34f15155d369025dc46e24ec814cc89186d3123b595d50494694c8339c8f534eafeecdd70b72927dd9b579e0619b1ee9246482cd34938c2209d7b96652ae1e6f107996e6b0af4aa948a214de4707ddb8d34fcb7729d45f5275947", 0xe3, 0x73}, {&(0x7f0000000280)="20aa60e3002649be2da69cd113e5b00c3e1a6f", 0x13, 0x9}, {&(0x7f00000002c0)="0dfe7e96c62dd1b53c3b7a5d5a54b9bc4df3cdbd5259da16b01952fdf320f9ccdb64e8f7dfedd4b0101671323430848323a13dae0cfcea6ce315c33470fa8a917e329f1631a8a5dd57a8d6225e6b70f5d911d6b9be54423449c0f2b1159e5adab67e980a2d672ee10baca6c7cd095d50bc87113fb188252ae6adcbfe111901bacec3674f4fd9f92c87b56bb307064197e9091641244a", 0x96, 0x200000000}, {&(0x7f0000000380)="99e43674ed51dbd16a591a78a5c3fd3b45c14c0d8a45c702f6b9051d7d174795f6b080d0aa4c3d25586070bb5ed01cf51f115317ab0b2d7855b3d8ae25cf4b06da47b9d74f58a2ce2807c7f8c65178f05babc9a0e22e581ce1c4eae2ce5cf1dd156a26af5eee43bdc7df8ce70ced77ee7d", 0x71, 0x4}], 0x81000, &(0x7f0000000600)={[{@uid={'uid', 0x3d, r0}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', r1}}, {@pcr={'pcr', 0x3d, 0x1d}}]}) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2655.432732][T27844] could not allocate digest TFM handle tgr128-generic 18:43:11 executing program 0: 18:43:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x04\x00'}}) [ 2655.687780][ C0] net_ratelimit: 15 callbacks suppressed [ 2655.687808][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.687836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.706230][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.714350][T27826] could not allocate digest TFM handle tgr128-generic= [ 2655.714350][T27826] | [ 2655.827250][T27852] could not allocate digest TFM handle tgr128-generic۷ny 18:43:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x93\x05n\xa9\xfd(\xa6\x1a\x00'}}) 18:43:11 executing program 0: [ 2655.934976][T27956] could not allocate digest TFM handle tgr128-generic۷ny 18:43:11 executing program 4: syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3ab0dd71be329c3, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xc4\"xJO\xcd\xc7 \x00'}}) 18:43:12 executing program 0: [ 2656.275109][T27932] could not allocate digest TFM handle tgr128-generic [ 2656.411138][T27945] could not allocate digest TFM handle tgr128-generic [ 2656.425501][T27988] could not allocate digest TFM handle tgr128-genericn( 18:43:12 executing program 0: 18:43:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x05\x00'}}) 18:43:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic2\xb7\xb2\xba\xb9\\\xb4\x1a\x00'}}) 18:43:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3b97cace1c04e3b, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2656.691281][T28007] could not allocate digest TFM handle tgr128-generic"xJO 18:43:12 executing program 0: [ 2656.797080][T28120] could not allocate digest TFM handle tgr128-generic"xJO [ 2656.807685][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2656.813579][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic8\xb4\xf7\xdbQT\xd4 \x00'}}) 18:43:12 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x14000, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0x4}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(0xffffffffffffffff, 0xc0884123, &(0x7f0000000000)={0x2, "0dd4200e841fedad132c4931d384a3583b3dc4a6f95980a1796293a74a8c3d4ce7cb744dd0296a9dad3940ae5a6a0d410c1b730c2b9db2fcf0c352adc78b49c6", {0x0, 0x2}}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x20000000003, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d0000180000000000000000000000000000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000005000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d0000000000000004000300000000300ffd14000000000000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ac0100000000000000000000000005000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff00"/185], 0xc0}}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r8 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xe, 0x80000) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r11 = signalfd(0xffffffffffffffff, &(0x7f00000002c0)={0x9}, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) r13 = getegid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000019c0)={0x0, 0x0}) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r16) r17 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) r18 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r19, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) r21 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) dup3(r21, r20, 0x0) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000340)=0xfffffffffffffeed) setresuid(0x0, r22, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r23, 0x10f, 0x87, 0x0, 0x0) fstat(r23, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r25) fstat(r25, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) r28 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r28, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000005480)=ANY=[@ANYBLOB="020d0000180000000000000000000000040003000000000000000000000000000000000000000000000000000000000008001200000003000000000000000000060000000000e4e5479b53929a88630b68ec060e0000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000005000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}}, 0x0) r29 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r29, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r30 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r30, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r31 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r31, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x20000000000001c6, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x0, 0x8000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0xfffffffd, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x1, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xb9}}, 0x0) fsetxattr$system_posix_acl(r17, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000052c0)=ANY=[@ANYBLOB="020000000100e9da0000000002000400", @ANYRES32=r19, @ANYBLOB="02000700", @ANYRES32=r22, @ANYRESHEX, @ANYRES32=r24, @ANYBLOB="02000700", @ANYRES32=r26, @ANYPTR=&(0x7f0000001700)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES64=0x0, @ANYRES64, @ANYRES64=r28, @ANYRES16=r29, @ANYPTR=&(0x7f00000016c0)=ANY=[@ANYRESHEX, @ANYRES16=r30, @ANYRESHEX=r31]], @ANYRES32=r27, @ANYBLOB="10000300000000002000040000000000"], 0xb, 0x2) r32 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r32, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000005340)=ANY=[@ANYBLOB="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"], 0xc0}}, 0x0) r33 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r33, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) sendmmsg$unix(r4, &(0x7f0000005180)=[{&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000001c0)="c4a6d0365fc08a83336151e4c69cfa39e2950191fb0e61defebe13d61bc9e66bbad04c75266aceaaff3ce7f9c6484caafffb3e5dda05cfc5c2201793fe6a", 0x3e}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r5, @ANYRES32, @ANYBLOB="00000000340000002ae6858d970aef27c18ade19", @ANYRES32=r1, @ANYRES32, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r1, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0x40000}, {&(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001900)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="cd5b6e337da62e77ae2cf7164313c5be9de1753aeb1a311de822a67e29da5cddb9783d1837a9f37311314f9ec59a05a0f56993b92bbbcdbf79b2855b081f12c93c467918b2fee34523b721839cb9d012a3768b03f1322a09a86a78219bc9ddf7a87151085643b8b43bed144be636644deba66a39f0ec959e2e0f0bda1baaac79619a102778cf72aeae680a985a680b0c90e23f020d322d78296bfe", 0x9b}, {&(0x7f0000001600)="2120a38977eaa331c44cf4023c3b696f2111e136004404e176d74c023c5797b1ad140f95c043ff3c4814ed5a494a8ba0d339c52c746047b7caf60d60c80650caba885de7a3ceffe0bdde6ed1565252fdfbe6540a9af095a1809704abbadce2e925fee8dcd1bf58d97ac9f3b0ebe9194026a8ad03a5529bba32e6582c9327c4db6ba3", 0x82}, {&(0x7f00000016c0)}, {&(0x7f0000001700)}, {&(0x7f0000001740)="662a14d74564aaf2b79e24b2b559cde04927bef0762d0abf3731f66140ef2123d2625d1236bd6d9d2bd90b5ea2033ed3ef5a1899d47bf5702a18651f8245bf383058d3c7bc7811b67fc1d04bc8c10be020", 0x51}, {&(0x7f00000017c0)="c4315b", 0x3}, {&(0x7f0000001800)="d3e456c1fd68ed84e788e3e5bac0e4d0be12c0f8eaa6de725f13a5b3cdd18e14d3f2701f0cf3ed067b2ba13ff28fa5c634420623ef2e6083fa65e9196e", 0x3d}, {&(0x7f0000001840)="b7dddbd3358dbad51d6f88447ba99eba11aabb283f192b744da23def16d5940483e70a635cb3eb2badb482d037ffc445962840a1b967560ccec3109bf4973e31e1c095a630383b9872bddad5c8b43473d08a70cb041f8a5a88af45781c590da998242402a3e2c634fb4e3b1563e7f1cd66291904dfa7a74d6b531f4f7c6db5dd49214bb88715bb7b217b41c38c2892b0d2b6", 0x92}], 0x9, &(0x7f0000001a40)=[@cred={{0x1c, 0x1, 0x2, {r14, r16, r27}}}, @rights={{0x1c, 0x1, 0x1, [r32, r1, r1]}}], 0x40, 0x4}, {&(0x7f0000001a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001b00)="f34e3ecbfd6c0e142af824256359d5d6d7c5e1232b1b77ef015a285ac756a0a833cf959e2a5a9cba91e67a4d64e473124342a669bcdac952767da17806642d533b7ce042b3a797058f853093786f1dab35acd6da3746870bbd556c43cecc21f995e31d6d4c5b1290c48d22f68702945ece08f4991e83f0fd4d866f2288bf01c6163f1166d3ae5486603df5aa2caf967c59822f1cc315c45bb24ce5a8b58bb480db14d18c8cd743580f", 0xa9}, {&(0x7f0000001bc0)}, {&(0x7f0000001c00)="28f17c40bf1ca77c6ceac9bfb541bc767f473e8f117a982356c0e5e8aa5ae9a0e8dae5c66834002c7ffbeaf18ac1750133c521a7b3e48c4b6cb700fe829d36055895cbc50c02214e3998f671281599c4daaf6f8ba9b7e1465c7187576d75d25c0e1e46f42f475374d614b120bec40b9b82e8633ae4cea4afdd5553173e71bc117b0abb6c618e581d1eb8b98aaae81df7782bba2b52ad53fb75447a060c712826d56d46", 0xa3}], 0x3, 0x0, 0x0, 0x10004021}, {&(0x7f0000001d00)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000004f80)=[{&(0x7f0000001d80)="53a97d2f49b8bbf1997a344aeb66c91f3ae38ec2b7d3449034ef947ff7870f4f25eb8f6fc10f13a18936595a8af1c0ed37d888589edcb7d2ccb56451c119e53c013f2edd0b9c2cab052b87a450e4d58564c77248a5176cab9ffe3608ef1f7156c918cb198dc8e7f7937bc7bed61a6c3370ff2ee418e091c80c63115d44db6af0bb30352fd703a09d4c2ebc63294214d4ef7ba524b9d4c09d2161127c2f969a8aa611fe5b3da17ed36db97eeb9952436274f067f9d1da8b3366414d291f8a5c3d6dd6f5ad247e10d734564fe275ca93b943aba47c7d841ad7f9599695c09358d21924ac11c927913f05e0228495f74297291d41dee874c1e68ce9212a344b820fb2fa72c0ba8c09f64afd7d8cfdff19d7ba964fe7ec23820e67161bac514f931d5ab6c4d1755f6a4a20ba1f27f867a4bb85d2c169a708971e5edfa29c295712ba821bf6f5a5faef48965ad85ad8c4ad440a0933c7fc8e8c29f98b9baa2c0fe69c9ca4d9d81b536bf30cddf3e0359fb5eeb04c47e7dda38c43aae061707461cfec0f85d1ba71f024e9d896319afbad7e93e13771f44c7f7f0c8815ee71a4e5b9941b2d0ab69f52f7175d0749bdd6193682658bd8678f3dcdfece58ab08ad0f53762896971bdd5d25f7ea663fd0c75590b4d2399c01af45cd4a702bc878f80f8f6d69b3364d335fca774880b1030b92f067f16018dc591c9b6754b700e148a193c5808d5826ac8d249f3ce000609cf15dfe196e66d34f12a928af038728751af7920374c1a195401ef753e21d281e7976698ba0827f53a03a52487eecbe95b8b8fc1b408f1bb39e9326182e4c977f8fd63c96a4aa2863e1b3054ad6f3f4019d3a01ed88397c7fb77f26a42ed68611f52e207f2b6690ac60e4a0e2a05ceb6745efdbd93fbb09f7f1441679033aeb61344e06c497dd6f9729c2f19f3de7f2b4e1e980d20f157c91782b853810ba3e567a6b1d5c8e76afce0bfe9715941039dc476f009a31a5652f7635617a961681231943c476567bb0fc6e26315bfbc484ab31464be5086873044fe31a792c8ff1ba0ce37ee80ed8f022f4fcecd85bfde19aa51d9679efbc557dd8ef0921d3a39a338b0308b5e786290038c08ae08a0a20ebf82ecbd50e1b8a5260e9de7fffe6fdf208d43b3da7f03e25af171850e978ddbb774c908d37b24ba6e5e03f326b0281b6d850e21a5c1e77907585200f395981e3019e8836096564b46dd8fd03c763f0f41b75f5973c7026a002c6e63dbfdb27d6a51389d643fcdcf017aa055a02c854520c0074ad9ba962118e0fa3f51ba0644373efd121ba8d836a8671594b7798c0b76125f48a06d7110a1ea22411d4bae64e3c1607c13566920339ff0a74097445d99235204ce2188209bcb9df42db068ae3f205524a4711eda02058ffc88c96c0312ac5288356fcb4f3845b6c30679d33d773a1feacf3c577431a0b5af42218d3fad127822251564b924bd6be61ccdb50a987022b9e4d0263872630abf1205bd1757cad0104710fcad020aa59094777de0c82763dee73f5249ef027609902ed836fabdf3df0a5130b68424d35f7334c4b22499dd06f7382cb04b415c200109af6734100b8f79ddcb5765d9587018befd80bebad786959de0566bff919c95ae7f9a14c0e9e2959c3507c2a6af38346c05e0d0b091cb53cb65d01a5b427d242b31ff319b08676cce2f0641d8cbc2f3f6c9a5ef263137cc38257c98a444652e75acbdc7d5c963328c613f3e8d9e2abd1f4dc8ac86d0f5f08eb10734ed233e27dc768bf31f9caea28b7a8166212f73cb07f4aa11aaa973899d38e2d1e09947ceaa6f3ae4291fd8c23a2938342b221ee045cf51b6ad1c2b3c7b785c2c7ad5055774eff6aec4c79811afdfed2ad588ba7b6a40703bcc8930a6ce5141ab43a2486983931ebef015f4cc76418189add00bb96e387288c42582cacfb91e4584b6e089bcd80d7255153b8f69c8303c53ff64d0a3085eea10cd5c612282f15603b1486e788e2e1df26ea205a9804b57dd74a034137a371eddc9cd5dca46a365d6a9d5f86c877365dee2478d3b346d387c5c4612bc3972192a2e78fdc30965d3d1a8f83923060b5d3e7fb50ede922598f7081062d0f3170ef0633da3004b62b9eed34e4742647e98b3d1aaa096afd9e83f2c84f82e10adcae031b8477ab212f87bc5e6fd57036acc70f349d0faaddacd0431a6836d1f42fc44a5232f3b5a6cd824d272a624a3587518a1ea4cc4ac0427ca7ef2b5c0231f26f3f96c093079d1f2bad21183d76d531c8e44be90721d89976216a8b23cc11a58ceead52113ea83224f4d123d46add58500f65aa83f88eddba16ad3be4eb7707da50f0a0bb5a24aa33703116a8dca6019ca31046d6ddf94fc0ba455cfec69564571c155e167e36f5dcdd714cf0c4a74f502acd42e9e80cac839261d0acd2eac0d42e5d97fb9eb8fbe849c6d5fb2136d8214a99846c91a7f4f3c41c1a736b3b4b634c50542ff34fe252a93adbee27b17e7f8d308c9d8181e09591717ba5d23452f3a8f35661676ba253abc40a02a2d5248c3479e76668103ebc43eb9ddb6fce280fdb8bf820667467f0179502c302ad728b5a7d7af907a88ea764f8f81f3fd5fef460ea268fdcbd0f15af896df2c4c263eb3929be783c1d003123e9d1978818f0dc5f1ce4bd954ef6a20a9d5532177a53368a7bd1f5a5c1eae445e3d67fc985472a12c32c6109bb568a0a6c248ae356645353d20a9db92cd103bf17e8bbafdf62ca2fad7d2bebf8ae8ae440de962fb18465b669dcc32e97d0d3dd99082f78ed3391a9577a3d7bcc64f8f29afc9e2ca9101228e653347fa27d3bdf96d0058110d8e5f611acac9ba60730074b04a3564c1a724e6caaec34a8cdb99cac7b1391989e5b1b630c3007b7de4a32f1f8431c0992401720c60aa83bf368180cf0ce9ac367c674c45618fdc64d594bc77ecd3c24a20f0b2c79e143bf03d8721dc311f4729d78bf35ad7faf32467cdb496c1f6628613c0e0bf4918c7b4001ddfe0c4efda1716707bea169996ba5bc8f93be42cd34e0ff10fd2b8f9a411f39bd72d42627463f9d89bc6e869b7244370b704620b550d7d249b69076224b37fd7a36c827bcd5c6a3e91466113bd9587e24d7555f91e1a7471518b49f04846ecff56f63aba7d43e7313097a1b6b61bcc5a5006d720dd13e43f653da73cb58867ba52e7ee81633836103c8a1ad582ad5ed6cf63facac83ac7cf63ce88aa6eb67c1756449ca38baa43788ac8329222985ab2be99d40bae0e9c9295d4cf53cb43a71ac039eca2dddddc09eaf1c65c2a3243c2eed08120572e4b260f830e7bff2b91175663bea088787ef605f5b6c312512ad124e0cebc273f12ba94bd22e0090c8d8ee56ef3f53b91b092f656c5bfd2fcfebc5e801af24212ea6e0ee250979d827e8a82d6e2d10f644bc8b081e9203023236cfbf35d6d399d29a1b04b5762f2a19a82f049085f5b34437bc6f466d343160e787e7298de920c1ffcca78ca22e3c0a7b68f56edd7882bd0763fad64aeefa27786d4aa27a26fb0bc8eee4fe1fdc554502a87b7f36f855fb510723b4e32e21e291e7cab8623e7a87d6330d665bda2a2d950554b1ee8c0f4ddb297368d38254754b0254fa797cbd205ba0656fb1c1f3fd62453418152eed729221a39bc7c1a1ac2c0ca9a2ca733ef005a7f2e49c0840df03d3fff28922de57dbc40da5cc8ec722c15d7909913723fad65c0b4c8f15ffdfae598e619d8461ce0d8eb67bdae5dfdbfbcae7990b48e5fa332af66f1496f097e7f8b6b79c728be7a26a370723d0c63273b027faab52b3064fe805ea615107dba55393d12a49711291cfc98365a975a7f4f29c24f7ad57f05343b001d2e874333ee69436262e5a87c8be6e11260ed4f89a0e27373c115982ce048f8a708b0d34e4eb4170c9c1659994855c6a9a92208c5172ee9c3587cf274507979ad72e661f5cc7b0f17537041e70eb991fa13533a9516c5ab443d0335663f4de136c58f0236abb65ffa14eba3033641b80db127db9a263b2a626e66c3169e5fb176720481c525a8a91b8fef79ff3ce48a03cc6de2e4bf912ac9f0dcf5a4e17ac974cb7f5899826a744424cdb5a8282df356fb99aab0b98f6ce1b7e6d2bf76bdbabb88e205087ff68b1c7e926a699e3465c32b8ba2dc5d400c8bd0e573e489b9b1fc61589d8a8daeb110332daa267ae44711c8664b4eef3607e939d3b9cbbdda2f783f5714e954be1dc77b0c96020b9af0cfe01b860f927e8435a475c0068b6e3778bfe36bca1c77d55483355150dd622218d73be4304a3201844629400b4983bd39ac4abc9bc56037492e9cc07e4b44e04ce098f4da644f03ddb95f804eb18773c4edd40ae1146da372cc58d3aba5dca2801677f6990b55de0269d59831e18623b5c30587f611ee3e99f7be2bd388c9adf468902d9031c13edd03386ced30134a47b67f37333a0aa0138af5aaa84c2808019a02d418bed2020c0006c36fbe8f290f662b7fdf03fb00cfc09f0ff4c9b06a36d593b4d5c31a1332506d92c4d8bc7e2647397be01c5c78aeb9b663202554067ae8d374b3522e47d49262db0fe72fbd4871b66130e7c54fd03f56b482b71597cdd62d16d187ce5ed245dabfc8a1629c4a3ef999f58afde84b5e62ffe6a9fbe06475130a96dc9c228a7fb39a5fe13c18473954e639797744b62b57526cf7d1ca07c106ca0bb587afa21e9d9204a94b621ed433ccd333b7a176b351cc0c3592a9d4a22d6dabd397e174985475b3f4ae73bb40e9b6354d22526a28c36ed087b83fccd7dbca9f250ba18706ea327c5d026720eaca85fa1b40e8824d551f6b96c21d6d9ae1044df8e54edd16b05bd9f63d5edd90ac398fcf0edc26e7b30a09b1668cda2741b5961a3e6d6f2693a59e548b36dc3b5768da8e7c35a321ca5cdfa962c04a842a1e3b713716697baf5b449afec8c1fa416d071dc6626c92481b033dda86a8d22c671ab054b6f7c702063b3061d110afdb2586c802eadd64b0344e0d1725c7d5e1c5e7359779b930c24789905be841cd12ad98459dbc55b829ea0534284dd0bd74a3d56f71608e89d52300372759f96ed5e02ec9d34f2abeb49f9d9faa1b423a5a336f41c7ed45ec7358477a6d0b59c80df78a23a8ec64a9e9a5532626b75ae7351a00774eb6a89368cea86434e1dc179467800f5c44d013d7687dc13d4f47b9dfa4fa392f1e91d1dda3c0f31a870b3195c228bbac580b35fa6c01b698bd6545873544d59d1135fc8fe4eb8fd52c5fefbf47d78448c8552d52673e68027f9f7c68f7aaabbd4938db8eb78cf2f3aa76b9cb5d5846215a915f1657976ca30062d4ce5a1bd92fd2726365b7d98266e9ecc451fb7b05b1148786d706cffbaa98a6b454b0f890db454b3b07751d0a7b3d6cf141c1d243ae36337f93e27cdda6d6d12541d60fb68d624eb88329c134f160cf971eb58b9abf519fd54e67da25cee5202675a777fd18a594f56e8d41002bf44a3bc44fce5d3a034ba8ec6a02435ad1807cd2a4c41646336c284439868f4e6df0afdd6e9377cbf4e20fe5c5c68a2e4ca2d2e1902d17af0e637db5dc11c9234c237b86a2e8a1da95c1e3ade9d9539cef3928af41a5b0ad10f06fabae50a03a540e4f0bcc7277380739f95b506ca3bfa1f42baa4e6ce335cfdf4f5fdec430cf236a59f25312eb844f969deafa4e5f10514557be19564d950e6151baf04dc4cb70910f1e4e192aa546ba257d6f69400f31012e89e815a963204b1b3c755b5b2286d40e1d3f3f64c67e671587e72e7fdab", 0x1000}, {&(0x7f0000002d80)="f8d33195a17b1d2cae88d7ba678c1129248e3d618fa0496d38657abbb9a42ec0e2965d051b718a1db89a83bf6ef850b5c0c6f8ad7e61a4539bc8a5825e3ca3c01bb8565d6e3341de0660a6e3bac9ea31a6aea51c29beb8612597dbedd2f1b7543b2de04e84a8ec722f60cedd427bb88c30", 0x71}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f0000003e00)="922b9af08c3d0f7e41fe0033b839a86d53440fe9babb2a0d8779b3fd163eac1d88ef5c825a7db8aee14b27e22edf44727692dbabe077506c9237d7efebbdf9428da974ea099ed1cf10363ac14cae70071460e4bec499ec79e1551f01b5adc9cc50c3b9a41ae3842c8bc4b7c11d44e87d0e4c6c40ba3078fade7f9f52f959199c129c6100b7a4b70d804cd20a1616a754fa72506892192bcdc44ee56609fdc9ac9b07b021afb2635b6bdb8ab0a575a4cca60544305a02ffbd64ed4bde14fdd8a6976f3c0976c9", 0xc6}, {&(0x7f0000003f00)="4cda0467ae4876552439e74195f986b1b48f9a698bf1aa42", 0x18}, {&(0x7f0000003f40)="0512bcf9ff235b60d90040e1c220c2cea69a282121a3b4195d7c9527df31ef8e0f3c2db0a5804e6dd8c082d41ade77817a3610702dcba06d8daa3774f1ab1f41d6c37e37ff2b44bd491daabb7663d0e501248a64a875a8ca6ea3a12bf80aa6aac55fc85b9af12362e5dc82e01e0c04d14aa524d19ad5498f91497e682cdea7dbf15253e3e275c10fd309ddfbe51c26b53c987c5d9ad785de91f5d6cc3ee4fab843640ad05b9480eec0f7e5a167cf139ef098b8e1ba7810fb14b591e4f545aaadf695bb9c569922810a038ca9fa3d2c7751f56f67996b9d2b8acbabe111cc3c4fcf5c8010c37e87c7473afb9f8ba10b55943d3384a8cade151277abf6e96ee0071f4e10a27ede966667de4fb0925938f594697d7441644516e7916790f660edff463058018de8d57000ff84d01fcd287c9c9ee239c57585b42a61a52c17337a8ef1258228342c3ce54e644e26f19430d083bc8b8e96a7a522d424c88ed07fe83fca99eb58ceed05e363416f48a6a070a732b30b6cf2e6cbdb9c60a3140cb8fd910f592466cf9b0902c93ab6d1ad3bc862971b60da5d9573d84e802665ea419e8033f5475da8c2b9b4bed6674d5e1a90da2f94d19c0733836babba39734bdcba1c3cc168c917f43a5caa85bda645d9046e46e30f9df1759ad82ed4cfdd6cb3e1465ad521fa2b512cba6f7248b92e7e0cf68048575e9062d0802160d70e3beda2c3f94b4bb3d17ad4f42cb9cca56839d773204a1bd5f16445a064318bebb8437ae7a8f7c5e84fcb14ea8c8b5e0d963a90470245edbdefd8c6ea6dd9a61b405bd79f45dc26fb869f79ec6272d7fb50501abb23eaab33dcc3c7a6713f0e9164b7d036e33fb58ab2f1077e2315058baf924e8fd9f2bb0cfc8306635ff9684e79962f7fe35f63b1ec4054a39b1e35bdf3833a77c71fca5131700896ad01afa87dcc7d9f2616536006a253bdf5f83b9dc9bb26a0a5bd59efd3508c28575f025f5705c4553af7ef6b8e2a9568482d9a578050ae04c26193029f6184cba528edea85edb4f5c19ac6f113b2846de20ccfb5fa93691edfd733bcd1b130bdaf463f879e2936505b8a18b2f21050907706023fdd4f8b925bb22c062be176e9aabe9ec1eb13e7cd09dce6716e14e550a4f0da8528e4baccdd175f5f53ecf69eb6376d70dad38a60a48256b13b77a00e25697832bc4bb16cdd7961cec664b58c630e68c16a31573a09348d2a1273292f84c0f0a1ea9dac659f60b3f7eef708ee0f8aa5fbeb9c9294c032f448f5d2f30762e4c9871ca213cb1dc699282671f47e04414b4cf16d122b9c4a47fe7e6e5557fbfb27a03dae9c005bb1a4e907abc527e1be870c1db1faf03a901628dcd834f069c6a8a800c7acf7094664e252590631c9eb42a6107de1bd5de6c7629ea8634e065bf99a254d4f4c1122742487868bd3ee0971baf699139c132635db7e8b65ee9417939ea12e0465e42c271fe5767cfb4bb07a4d1c986bc754c37b44fb663d206e6864e49aef822eb01879d7e708ed142474ce47390a2b14a2fe118bb080a76611fef09beee6c90ba9fbe0e6130bf7c16ffd77b41f5f0eaab7292c32499b59e1462fb3d1fa41a57884250a7e8e58148d600faca8e46584545c654903c203e2947a6e983c367ce395daaeefe420bcbd61e1090009e3f44259a743c11fc8a05e57f0dc3d9b9d0b293516487e24c14614c7970a8d8c570ee48040113c56db0e2ae83de649369f6b41d4e3f59d12abe33b94ead215223e304790566df75122a6fda250fea9362a4bf5a9dc2737f9d3a73f104fb5047766a2ec766265827ac6da4480cb29a73a761d39b85a6c16082c0bb3bd4d9677eaa366833e5dd497b64a7bdec429e508fb9eca9c2d29e7c61aa58031e3485c52e9d14fe444c877098c896c76cf20f429c8daa2280aecd5bbe33ce03e56ac51858ec424372496c1aed3f6649c6ec8713d5403aaf2695ce4305813c084039fe5f19fe5e10fae546a97789274a8b87e3a95d48d9e32616cbcc49df0b8a298cbe7de720fc0dd8817315f2a5bc0cae2ca593bbd5594601fd2091288837d2dc165599da7cdf546336aa3739097ea75988787ab7729047384e0f4082b4ee3fd3a73e2e235d231000107d73d92e59eeb9e78b35a32c451fb6456ef961ec2172502e39b4b9aa43d7692f32425b66729fe3b0c7756412603a34828074e89268b02253e5235c4ec700e74497195f2e161fc1d83f63e77b2505d8d84c1b6ea1050ada7b06c8c18787f88fa14f14964c308ce383f42f67736219cf6663c9c9013153f64d992ae2062ed3f3b3121b1396ea1cfd26d3fef27bcc88a1b51bde194497360e71f42bf59ed6e72462dd7282bbe51e1f36b03c98b8e670fc0c6ce427e817f88cc2d4c81cedfb8b3d4607e47751d971fb396bc82cc59d9cb8684f817733652813ae0410d5a1c633f1848fe3b5c23dc5f73f1192a98e8726eca59742102e9ab78d5a8343090ddae59cfe92af7cb2e307877a80b1e18b1b6c6dbaff6bb5e4ea2ffcca878bd3e2606aaa3a8180e5ebe206e16de2037e8a5ce728cda7248e7fc7bf095459903ae4f0a83e45a645e2a9850743f0c8888d4302d45f169e68440d61df5e6ef99187da8f9e1b4fa7c12d8910df2fda659a2b7636d2865214cea1d0c03191ded43ba5d1a2398fe5be9b6626b57950a8e80cd243d9ba69aa8472add44215e1c68e42a938d4007e7f0e9742b10283889cd273e5d24899c9c2df4f2ceacf0352a50beed9bdb72abd738d05acceaf84fa8c057155b7107c3a0a91b6183555ceecb041c4b47f190fe624733cc0ed7d3c14aac1d9610050ecd9bfc78574e1ca8e0fe58e2b80f7af820c235f0edb3769164f60f3d09be2f0f10c58caec8e884d0c9445e867e2ed98e3ede0c0f21161e1984c926e33512d387267dacbba192dcebe2d36f7cc804deec02dc304e03e0d17114781df1112db2c28f64d9638fac0e958ae722eebd5b06312f4cc9a77969dfc2bc6d9a4acbddcea35e38a3909ad5f0b70fd699f1f347f4da001c89470252460a3e25944485e060be6bc005aa72ddee6e7dd45dc445b9954c10ef0b3d3a0b3e403fe212a65cdce4ebcd8ca9a7d3847bbdd0e8f65a40b6ddac83b18d7759b5d77a28746d463624bc77691214d4616ee1295d283b6f777749b043f4c15b55d025242e5c0bf44307107bac4f1f29c7168237bbe08c6c76837f7854fb7325a415a0fd9c4b02226e46778ab8e791776e6e33fe5e9143910ce876e3e47143d323e67fa3845f00e153d707a515c3d624825869a054650b343e5276129f6f7be817c46e3b5fd3ec9a15b1764cb65b515150ec8b4a46bdac4e81efdb0c92798ed12ebddd860c33f341076e11cd0cdf438505c80bde8e64e65788f2e379470651b2ef59f65ecdeef7d0da99156767db8ed22ffece36a084bf98f2d4ebe3a3c52463d40a2d62ad895ce69975e7db3d79d68f7e112934272e7b2b2304d6c59fc808bc8065916ebb76419911a4240512a5fd789465b9f09816b827a451475575c4fbcb36cdc57634eba90893b513f04aeb3cec389af2834196413587d14817639d389354d83ebac18908cac99b0c1c1482ef65f35006d527ec0af0bd4ab92362f1b8ec43586782a71fe858ed7def39838e8ca55679426d6e897c4b29446805075df6a333592b2aea0082a145446044ae9ce8d337336c4e39b8b6a4aa8fa9970fec4b3e05c67df04056fbb50cb1ffecd11e2756b9b28ea6ca6bb9716fe0fd50ab19ee659c24e290a8b5471c6a5c790af6f4c2f245cb45d9313d6bbfd4b8851744972991b30070e3aebe75d0c5a5977b487c29b40fe2a0b84ad07819419fa61728072050f95dd3e5a1c1794608f2a834fd4359a392701ca145546735e0067f24219ced00cbdb6ff8152d5b3d08050fb3157b6f6ea8253b434a91b0eec2290123df552976f777db3166543d9d126bbc16a30d440b17d0950ea2b7e34981a64890cea1fa481bcacb2f49943340147ac1223576c51a5a2482c4aae28e60cf372e332e45e9e2757b9e70c97a7dc05339c014542786beb9b591e70b776cf925c5bcb54021c18ce9d731089a3cda24eb221a627ea063baad38c4db8183e8079d8395e35d15f14a3c38551206cb4d0d4976851313823d71bd05c436f5b3e9866ee16e197972dcd9b6b307a5ad1ed880714b053c7395e9797d3e4bb7a05a0df7bfa1b129f4d64d5772ec69aceb3d117f88536cb3f66b8c2618043c624988190239ec6cf03b4ff649fd89ceea903c2441cef66de6ffb06e1cff9911107cd4c54e11f4e9b2793ade4378d687e9cca7774963a9043f9db6e5a88720ab0260e17f61a2e8305bdeaccac471a93f5184e450f5eda6ac5a35cb1a8fadd5bb634602bcd7915bcf37e73141fce7209bb6b053ea2215e327781f6a31227c68ffdf070ab004929c5124b28cbbdb96f76f52701442369431e1d0373087b5ddefad58f4a42c976ea4457c53378ca61214bb6bfa6adcd6858dbc1872eabb48c37ea5c49b82177651b27c8d70092570cae930af3678552ecacf261cb56145140d2302415d63c383101ae21528bfd3ef3ffb2e8b0e9c0f1aa9be8d83481b2c060a00933418a5af815f86a318cce4d0284afa95e41791a4845eb2f662e5fd413b1443620027fbfcf9fa540eb27e2941211d6f7dbfcff2a58bf4a96f312fa2eeee26198ed2b944c0b8e90ac12d46be06de055b064dc4d92888534b1d2e9f37505c348e4b84a5ec1a31fb6dcbcef623cce56a1dcdd090a13fc5dca10fe4b3569fea212263e6476041ac4b170607ce48e0299a5799653445a8c26f4eb2f431f698d3ab2c061109535dc4ddddc2b0723278a380a81ff6ed27e5401130c77bf31851e7cb95d9654d89caac0db3c0ea5e5bcc30c362ef6f3e18436bb012c7d0b4f7c8de255cd03b27a3717af38684663e77ed2eeb3e2b9d7d3787aea52a7d61b58c79802804d7b00ff6a4ad9d3ea2eb993a66693e601399ff66b2f9f8e599b79a0a558e2e0f318b9801171366cccb6fd5c2d6f8ee1ce80f1e007c6d45ff91814768a2be6068261e1adce9642ca5d363077cf961db8fc67a0fcbc4490b55beb798d3e41fe341bd4fd5dddb6174bf3c587d95804ee50278dbc1ca2de9276953ca7e653fcb7e7b2e49a556f051b9c554881f919a18c0a90c2f8dbfaaa5565057a4bdb4f0684a455af947b4a64baba0aa90a1fbba0a7cea7d8af65a494b6a8937f87b8cc126783b0b65f9aaff769ce068afad34143807664b8ab938abe08f342cdf54907e4998c342f77aee1dd5070136795d6fd25ed594ae414f6ad906acd557bc96c52ccb1e98972041aacef653eba6d09842338c95e370d11aebcd293a5a5614d554822ae8e424ae1b17dc04ab74720ac1bf7a20775ebe6803ee2fe1e28ce981d11ad6e31bf15d4672e1838d882714b9401b57e2b98ff334ba2af69223ba291b7f348203626ec3de1fbf4c24cfaf6e8a9c69fc2e1a7826d4e07a6139146a222255bfd095914802a0d7bec4273d361bd2f3bf865c3afb3bfd3b4ae1e4fa29f6832a0e80c0314e7bc5744e7893b0177d9d62c492f6c350931ed36f3cfa97c9cf4ac8f258ee98c86f2377108c44b836582e1b48712b44450c9c07386fdb18abc51b054c1f365b6a4c93ebfbe5f7f8963cfa2835b918a03228763d23b18d24baf6676ff6427d8bdba6b894ac2eb7e46f85c9ee0f68ad733d8f844827ebe0271a6699e9e929fe216f48be5be597daddfa44b570a285468cd85463c75e838d1672452601899ea07c4899e60b7568236866f327f8bf", 0x1000}, {&(0x7f0000004f40)="478eda7dfa9029b70589ca45ba9c7fe79040032b5ed794d0c6a5c256e59dc16375", 0x21}], 0x7, &(0x7f0000005000)=[@rights={{0x14, 0x1, 0x1, [r33]}}], 0x18, 0x10}, {&(0x7f0000005040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005140)=[{&(0x7f00000050c0)="48bd7aa8f2da544043d9f21d99d12b141f5af921407b7ab931d5807cf03fdcadf684f430caed27f7f4424ae8fbe02f3c6670bbe712aac1a066234df32cc855eb15148110a48eb853e213eaafb4995e6ee28be8fb15d424428dcd05d5675fbd7adc3cd78855907e5cb11f770d14539b5289ea131240131067ffeec19a7fbe19", 0x7f}], 0x1, 0x0, 0x0, 0x20000000}], 0x5, 0xa048020) [ 2657.087145][T28125] could not allocate digest TFM handle tgr128-generic2\ 18:43:12 executing program 0: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xdf\xf2\x02x\x1a\x9cu\xa1\x1b\xdaN\x1c\xef\xe9\nJ\x93\xf2\xee\xe8W\xcd\xc4\xadG\x17e\xf1\xd7\xda\xf7\xa1\xcf\x1f\xa4\xd3\xe32\xa0\x8c\xd4\xd0\x9a\xbb\xe15\xf2E`\xc9SX7\x02HG\xbd.p\xf4m\x8a\xd5u\x9c\x8c\xc0\x1b\x11\xd1.C(R\x16B5_\x1cVY,M\x83x\x89\xbe\xfb\xa5\x99\x99s\xea(D\x8d0\xec\x06\x1d\xe4\x9fw\xe7\x06\x11m\xcfL\x10HW\xf3\xf7\xee_\",\a\'\x11;\x85\x8a\x80S\v\x90\xab\x13\xe4\xc93\x96\x16\'\xdc\xecq\xcdQ\x8d\xec\xe0 \x13\xbd\x1a\x1f0\xcf\xe0\n\xeds\x85\xf2\x7f\xf1\xa4\x1fam\xc7\x12\x90\xf1Z\xbf\x15\xf7t+!}B\x15\a\x13\xbf\xa7\x05\xb1M\x89\xd5\xc43\x94\x84,\xeeFw\xc8\xe7\xa9\x9a\xbe\x0f\x80\xb9\xef\xafg2\xd0\x11\x94\b`\x8apREK*\x19zq\xbcRZ\xb2\xfc#*\xdaG5}\xc0y\xb5B\xa1Aa=\xde\xb4W\xdbC\x82f\xbb\xa12\x8b\x96J\xfa.\xf3mekE\xa0\xf2\xcd\x89\xe3\x99\x9c', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) socket$inet6(0xa, 0x1, 0x8010000000000084) [ 2657.207741][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2657.213661][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2657.219604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2657.225433][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:43:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\f\xaez \xbc\x1a\x00'}}) 18:43:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3be21ceb7eeed60, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2657.389683][T28123] could not allocate digest TFM handle tgr128-generic 18:43:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = gettid() capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000180)) ioprio_set$pid(0x15c7eb1dc9a1fb9, r1, 0x200007e33) clone(0xa298a179, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2657.461460][T28142] could not allocate digest TFM handle tgr128-generic8QT [ 2657.473399][T28137] could not allocate digest TFM handle tgr128-generic 18:43:13 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x99}, 0xe) listen(r1, 0xffffac61) r2 = accept4(r1, 0x0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[], 0xff42) shutdown(r2, 0x1) 18:43:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x06\x00'}}) [ 2657.590962][T28269] could not allocate digest TFM handle tgr128-generic8QT 18:43:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x8cF\x86\xf9\xa9\xee\xd6 \x00'}}) 18:43:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xefM\x18SLm\xca\x1a\x00'}}) [ 2657.767705][ C1] protocol 88fb is buggy, dev hsr_slave_0 18:43:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x38}}, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125f, 0x0) 18:43:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3da6cbfd4de6715, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:13 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$rds(r1, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)=""/196, 0xc4}], 0x1, &(0x7f0000000580)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000001c0)=""/191, 0xbf}, &(0x7f0000000280), 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0xaf94, 0x1}, &(0x7f00000002c0)=0x6, &(0x7f0000000300)=0x4, 0x200, 0x1, 0x8, 0x1, 0x10, 0xebd6}}, @mask_cswp={0x58, 0x114, 0x9, {{0xc4f, 0x6}, &(0x7f0000000340), &(0x7f0000000380)=0xae, 0x7ff, 0x0, 0x6, 0x8, 0xcb, 0x6}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000003c0)=""/206, 0xce}, &(0x7f00000004c0), 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2}, &(0x7f0000000500)=0x2, &(0x7f0000000540)=0xff, 0x4000, 0x7fff, 0x0, 0x7}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x6}], 0x180, 0x8000}, 0x10) [ 2658.193841][T28317] could not allocate digest TFM handle tgr128-generic [ 2658.312010][T28408] could not allocate digest TFM handle tgr128-generic [ 2658.386683][T28292] could not allocate digest TFM handle tgr128-genericF [ 2658.420770][T28308] could not allocate digest TFM handle tgr128-genericMSLm 18:43:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\a\x00'}}) 18:43:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xb8I@\xcd\x99\x97!!\x00'}}) [ 2658.492902][T28498] could not allocate digest TFM handle tgr128-genericF 18:43:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 18:43:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xb1D\xf3\xa1\x16\x9a\xce\x1a\x00'}}) 18:43:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3efafc96df10447, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:14 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfffffe3e) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x20000, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz0', "a3cca2a9bdcb247049ab717a14a3392b02fd30452ba03e3bc916c166888ee39dd06a51e952cd2c6c5dfab4a8792755656c448a35cb8ef0d62daef04847914709d3c106"}, 0x47) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0x2b, 0x2}) [ 2659.046632][T28594] could not allocate digest TFM handle tgr128-genericI@͙!! [ 2659.130222][T28604] could not allocate digest TFM handle tgr128-generic [ 2659.177908][T28728] could not allocate digest TFM handle tgr128-genericI@͙!! 18:43:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic!\x8e8\xddb\xb5>!\x00'}}) [ 2659.388680][T28813] could not allocate digest TFM handle tgr128-generic [ 2659.431711][T28693] could not allocate digest TFM handle tgr128-genericD 18:43:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe3f463102a7d7298, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\b\x00'}}) 18:43:15 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3a6500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xfadw\xed\xc5\x05\xf8\x1a\x00'}}) 18:43:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x3c0a, r0) [ 2659.986734][T28874] could not allocate digest TFM handle tgr128-generic!8b>! [ 2660.023809][T28989] encrypted_key: insufficient parameters specified [ 2660.083092][T28986] could not allocate digest TFM handle tgr128-generic!8b>! 18:43:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d00001800000000000000000000000400030000000000000000000000000000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000005000500000000000a00000000000000e4000000000000000000ffffac141400000000008500000005000600000000000a00000000000000fe800000000000000000"], 0xc0}}, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x1, 0x20, 0xffff}) ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f0000000380)={0x0, 0x20, &(0x7f00000002c0)="553bbb9e5181485ae9d50395ef20f884da3802241816521703bbab1c9d9b78ae2cc64c8456aa7eda3061738197d6187fa3100f9ae24da384f3d7ee493a952c8727b9afe4bf6c1bc9836862c4d0de0c7b19d3a204dcc28d9a13b4bb3343903d570f3f1ea51c6688bd798f43b640c06c22011fe5605d287519f279325d30a89f500239252224f7a15086b3373844f31599fb73164762a0a6fb13808b3897169829c5bc7cc4b47a24fd490de6a59033f3d85cf571a6401bfd5978dd33a46ae69459", {0x80000000, 0x4, 0x47425247, 0x4, 0x81, 0xffff, 0x6, 0x3}}) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f0000000000)={0x80000001, [[0x4, 0x200, 0x9, 0x80000001, 0x200, 0x3, 0x4], [0x200, 0xc35, 0x5, 0x1ff, 0x0, 0xffff, 0x1f, 0x83a4], [0x463, 0x7, 0xd64c, 0x2, 0x80000001, 0x80, 0x9, 0x1]], [], [{0x9, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x80000000, 0x101, 0x0, 0x1}, {0x0, 0x3, 0x0, 0x1}, {0x3, 0x3}, {0x5, 0xfff, 0x0, 0x1, 0x1}, {0xba7, 0x3, 0x0, 0x1}, {0x2, 0xfffffffa, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x80000000, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x7, 0x0, 0x1, 0x0, 0x1}, {0x1, 0x1f, 0x1, 0x1, 0x0, 0x1}, {0x43d, 0x2, 0x0, 0x0, 0x1}, {0x101, 0x7, 0x1, 0x0, 0x1, 0x1}], [], 0xffffffff}) 18:43:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe41a980fd6285cf9, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x17\xc9Q\xe5#=D!\x00'}}) [ 2660.220384][T28941] could not allocate digest TFM handle tgr128-generic [ 2660.255743][T28920] could not allocate digest TFM handle tgr128-genericdw [ 2660.329464][T28964] could not allocate digest TFM handle tgr128-generic 18:43:16 executing program 0: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000000)={[{0x0, 0x7, 0x1f, 0x7, 0x0, 0xbc, 0x0, 0x4f, 0xff, 0x1, 0x6, 0x8, 0x1}, {0x9c, 0x9, 0x3, 0xc9, 0x0, 0xff, 0x44, 0xe, 0x5, 0x2, 0x0, 0x20, 0x7}, {0xff, 0x6, 0x1f, 0x1f, 0x5, 0x3, 0x7f, 0x8, 0x4, 0x7, 0x7, 0x7f, 0xd0ff}], 0x7f}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x82041, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r4, 0x4) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r5 = accept4(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r5, 0x0, 0x20000000003, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000280)='/dev/udmabuf\x00', 0x2) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000180)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, 0x2, 0xfb25, 0x0, 0x800, 0x5, 0x200100, r0}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r6, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r2, 0x80184132, &(0x7f0000000340)) sendmsg$unix(r6, &(0x7f0000000200)={&(0x7f00000056c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004640), 0x7, 0x0, 0x0, 0x6800}, 0x2c000) r7 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xf73d}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$inet(0x10, 0xa, 0xfd) sendmsg(r8, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080), 0x1}, 0x0) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) dup3(r9, r7, 0x0) 18:43:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x7f\xe3\x15\x9e\xb9<\x01\x1b\x00'}}) 18:43:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\t\x00'}}) 18:43:16 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) pidfd_open(0xffffffffffffffff, 0x0) clone(0x20008b79, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2d030800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2660.854709][T29123] could not allocate digest TFM handle tgr128-genericQ#=D! 18:43:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe44211847cc3dbbf, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2660.967752][ C0] net_ratelimit: 13 callbacks suppressed [ 2660.967762][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.979808][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2660.991489][T29343] could not allocate digest TFM handle tgr128-genericQ#=D! [ 2661.065705][T29205] could not allocate digest TFM handle tgr128-generic< 18:43:16 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4300, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r4, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getsockopt$nfc_llcp(r4, 0x118, 0x7, &(0x7f0000000280)=""/153, 0x207a0d38) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'ipddp0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000008c0)=0x14) r7 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r10}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000021c0)={'vcan0\x00', 0x0}) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_pktinfo(r12, 0x0, 0x8, &(0x7f0000002200)={0x0, @initdev, @local}, &(0x7f0000002240)=0xc) r14 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r14, 0xffffffffffffffff) r15 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) getpeername$packet(r17, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r15, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r18}) r19 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r19, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r20}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r21}) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000044c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f0000003440)=""/4086, 0xff6}], 0x2, &(0x7f0000004480)=""/13, 0xfffffffffffffed3}, 0x2) r22 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r24 = dup(r23) getpeername$packet(r24, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r22, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r25}) r26 = open(0x0, 0x0, 0x0) fchdir(r26) ioctl$VIDIOC_ENUMAUDOUT(r26, 0xc0345642, &(0x7f0000000040)={0x80000000, "b42cbf4a2e91b88a1be829da34357d59febd3265f6d2b1f3f7b6d94784d6ca71", 0x5, 0x1}) accept4$packet(r26, &(0x7f0000004500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004540)=0x14, 0x80000) accept4$packet(0xffffffffffffffff, &(0x7f0000004780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000047c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r19, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000004fc0)={&(0x7f0000000900)=ANY=[@ANYBLOB="a8070000", @ANYRES16=r2, @ANYBLOB="00042bbd7000ffdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="0400020008000100", @ANYRES32=r5, @ANYBLOB="a401020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000012010600", @ANYRES32=r6, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400070000003800010000000100757365725f6c696e6b757000000000000000000000000000000000000000000000000300060000000000040000000600", @ANYRES32=r29, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100ffff40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008000600", @ANYRES32=r10, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004007f000000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000400000008000100", @ANYRES32=0x0, @ANYBLOB="a401020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000400000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400db0200003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000080003000600000041fe040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400cb00000008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000300000008000100", @ANYRES32=r18, @ANYBLOB="2802020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000c5300004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400060000003c000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000e1ff040072616e646f6d000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040001800000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r21, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000088003000b0000000800040000000000080007000000000038000100240001006c625f73746174735f726566726573685f696e740003000000080004000400000008000100", @ANYRES32=0x0, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=0x0, @ANYBLOB="f800020099fd0100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004003a00000008000600", @ANYRES32=r25, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000005000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000004000100", @ANYRES32, @ANYBLOB="b400020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000060038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040007000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000180000008000600", @ANYRES32=r28], 0x7a8}, 0x1, 0x0, 0x0, 0x44}, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) 18:43:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xbe\xc4\xcd\xb8\x1c\x9cM!\x00'}}) 18:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\xfc\xbe\xf2\x10\x0e\x1b\x00'}}) [ 2661.330157][T29344] could not allocate digest TFM handle tgr128-generic [ 2661.368946][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.375715][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2661.383727][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.390710][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:43:17 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x7c009f79, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2661.532773][T29544] could not allocate digest TFM handle tgr128-generic 18:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x17\xc9Q\xe5#=D!\x00'}}) 18:43:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe449fa77a395cca3, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\n\x00'}}) [ 2661.799171][T29510] could not allocate digest TFM handle tgr128-generic͸M! 18:43:17 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lookup_dcookie(0x1, &(0x7f0000000000)=""/157, 0x9d) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2661.912802][T29715] could not allocate digest TFM handle tgr128-generic͸M! [ 2661.927739][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.927745][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.927805][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2661.933681][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic;$\x14\x1c\x80\xb0B\x1b\x00'}}) 18:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x19\xa7\xcd\x987\xbdT!\x00'}}) [ 2662.271336][T29717] could not allocate digest TFM handle tgr128-genericQ#=D! 18:43:18 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfffffe3e) recvmsg$can_bcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/189, 0xbd}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f00000002c0)=""/102, 0x66}, {&(0x7f0000000340)=""/186, 0xba}], 0x4}, 0x11040) ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20048579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002000050ad22780648c6394fb0224fc001007b8fdf88ee900053582c137153e030000018025641700d1bd", 0x2e}], 0x1}, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x100000, 0x0) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000080)=0x1, 0x4) 18:43:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe459ed75509e2ebc, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2662.589938][T29735] could not allocate digest TFM handle tgr128-generic [ 2662.589938][T29735] 18:43:18 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfffffe3e) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000000c0)="51ebcdeb514f9b6974bfbee513c5985ca95df99cecdcb3bf4a46813be5553bb9a26e670ed905057b80fd0851fa3db7fab6236f5933d8538c8c3d583bf426df4d87c7813293feb3c71f63af62a9f9203e98c12c6af372c532202e25802f34bcde9eaaac90cd3962440458fd8df382307f14341cdfcacd9e4f817d284ef3b7fbdcf483506bbf5f5f4ada1eaa7d16a2eb9517d5ccb25643a8d181ea8ad5ec229a4f780e65a86f811e9e9793c9d3b8bc042fa3c801f685e553ed72943f739d6f1e7b791f798df769fe4f166bcaeb92f7550c5cbff9aba49b52277860eae683b38f5c2be3fe9e3d92bb2b1a4b7cf8572bdffc80a008739bda9e2d0d2fb53aba4b197edb8bf999a44ae1dda8d4269bc899e0cadf3ddc623a20ef25ddc2e5625088596a39b12c5b48ffdd4b71b8f5acb94c38410b452bc2c28b18774f6a428b318c37ff143e08f4070698150dda9eca6e6c27ba8963c18b4ad42c8e87181a999956cbefd981e9f976b6a554f6cccfa1e5db151c9adca9423543dccf1c3defeab3ef0cc1fa86f9d67ad065ecb7bdf857c82fc2a44cac870d0d3b015996ad5104c75729be7430348f757cac63a98f9b4583759073fd5cc2ebb3c970157c6dcb8f3c486c0100e3d16e370b7252e581c79c940df7e5ea24726b3d45939de6c89f152d8336abdcdef2b2937169f9fc16a6bb7d10a1e16baf512d6c63173a477168a7a0d3a3cd0155e02555134d28862ddbd60062b02653936ca87e26d9d28ae2127ec5a17d0812d168f6ae01336f4c14b491ae33a3adc39eaf815c1396c16c2662f55ffebe8ad7fe96979c537557bd2bf5eec207427837622cf1587cd3bf719f4b0b04d6ab79a6564e12dbe53ea14e46fd2d5f32b3754dd31ed5d62975ef9b7707b4f62194b88b02eb82483bbe5ccd258ee9276be9c3e569e02caece5df12910f8ec7ea87c4a6bcdde1a0bc10220bc450ffafee895c280a19b28023aafcd91ce10ca793f542e1daaed9024160e756e7afbbe126cc880361dc29c3bd65af3d00ecfba548fe9eb693a8f32ca9d8f6ebc9045b6b718184e80a99049f63b43ebe486ec92de176019efd158c1ae8a01afce10452163a5024696034c650aa900c0bdc5a078451edd2a46cd2064117c76f03e54cea5751baddac80b7d0c910128accf37fb37443d90ce90c23ced13183eb00ce81eba213ffb3f2bdf7231723a8183867266b039db861e0330fbd13b395a7b94983a13a4e5a08bb782b98932ca0b1b6333a94db5b89ced27792e67d5b375e6a89124c1012f62a0feb6c4ad0e60b20ec60fb0c0765f6bfe01ed5de83346e46bcbc7da6659a56306ae2c5929ef384f8a38d6dfa951c9d76f43699a11dea78fa6996070f6a58f5cee0ac6ec22d401e62bb25e64aead1f2ec2072ff33d6da0c212b0c86598ea17333597f0489d6dccf6261b0d950d0de1d78c7eb53905c5a39eec7a80cb6f086e8b5d75b2bc0b8a1fa07e1d99a08269d0a6022a687183717dfbe641846234863c03c84eb9385ea9a5195cb8dd69fb29acc68ab8bbbe107efbfb24c376f27948e51ffc7de2efa8502b538622758fbf8dc40cfd940b05c744bf6308b162496613ea02dab170d979f7150ce45ea71600b421eeb25d1f78688a6639572f18c457815866608bd6fb8b7a6b74e10d0a8683c0c0ba399e944d610183b76f3abcfd73c8b8d7a2602edeb6640606560a16d3df3d051f095cfd3e340f2dda9dd036043fdc053e2442623f703b54972b1ea11567173948e7f1f549345d935db35041478c1997e2132ce75ca20bca91eb22a8b4e44167629f02760b545e6fedb26c2b0893f5a3a3572d19dd3b40757130bb8b4b45af5d9ca8076342e12299940ef81858b3ee3150dd20ec04ad59cc70ccf4113fb6c46f286d03ddeb03fb3913d5edfe94201441fa46334804b54cc1e6dfaab009d091a8fe0fcdd5a39e3252da21966896f365900ba300e0711071457f20cd51db8e84f11448a7d2d4ebf66e054a382c4d8c1c62fcb6beda2b0a69b213098e2b5009951226f622c7c30ea3b91c81ca2cc5a8c2bbffe51911c5bf9b83073ee2a06c374f4fd7dbd35bff1aefbf829bee452a77c4de90d68b168671fe1a493dd07984baf778f3659e71c91424b03b3fbc426217977ada469db6a357950fa123c30102beeb8496e40189cf8fe8f0355db3fd0f0d89a46d10cb5c9ffb8cadf925894bd55a5ccd12e7c1c82bbce2cf1b0a912b81f0d50b4ca76ff48517e208c4476c5dc606d21cf4570c1329714e1cde21945aaa2acef7a4bf5e4b7a59cff15f2fe2820ba102ebcd79fc6c4eca59ebae615f761f123e1c0674c28ae12ebdd2d0f7bb37ea00c30c93350b7264e28d6c2cc1a52f8661ca88b96201e0307d900fcabd28a2277638e2edb4727debaa0564d7d67f81a499eeb50ea4d91270133af73f3ff65aeb526ccfb894f01fd80a7fff8bb8a12b067f215129884bacd5f72ffca3e1430546df99b291edf5047e11d83872795695d105125dd97e3c99fc44809992484a43c622d751b378dbeb17a4db4c7fdcdfc174cb77c326f613df403496ef47407486dd4d12a8aec90d0a90ae29664bca5c8e8ab15f9bf2554a0039661079fa39aca793992a1df23d9cb929e3aa40bc1589b4e9e09eb530203f68b5353ce00701ca493eeb913096a7366a9fd9c9bca4cb5beb160045a643fb92d9a88e40ca1b69ecaabccf6fdbc40ed7046c03c852e1c91013ead93114e9b3220f20beaefe3920d2e5e64ad0f2f5bc40ede42cb7a4e5b7bbbcc33cb7332920fd7732386bec43828788513541edc4dc797db0a3661418d6a78c4e51e37873b975622f4950fe20580a7cba8b703699d15a1f97cb653446dc0d9192624195694fc7210ee7c4eb4101a4a69e67183954fb46ffa8a0fd9c1a5d740feb89ded736cd89a1aab328e28b627c4cf8c31a4e9ef95212fa30f3188b36859efea22ba27f39e0947c8ec972a41c44e048822a520190c713155d174cb9b77c0ebe2a13046490f33f10bef34b637f168b73d565349a31aa0ff89e25713dbbffda56c890fe416203d6652c87c3e22e17304573cd578e04c4be958a5e5bd5ac956e9b91dabb8234025d1c4f0c8c9a4e26d619bcf6266cf5c64b816eda8d1fcd7a7c0fb54275b25407bb46b41e17d3c83ac65ec52785ac258d4b428b23194da3f8a69a9051486187675bab6e75360cd40d928d125d76ae7e2cda44bcb67cbfc58890dd85132a999bb28b9d28db30f16e7e3507cb452e4adcccb3cb144c9bc2c182483f8d1d27dd2e0db613e2973ddc11b860625859976c27ec62ac2ab2b39b2c8e83cc1a1444d7e9a6270a292c97f9cf3bcc7d9855bc8f743e5ea654c73bebfab116e65ae003d13e2ac45795f7aa9503fa4330967bc77d407b0ae4eb0b722743418a56ea988b2aad11ea438e8e6db2b242dc2769713ec84f6c94858e92d28d3fbca2e2a40ebfadd805fd24a604599581532808c6afcdf81fee2c40c690c8a2230310b7b7722646ac5e7c80bd4ee18fe916b968a0e6d91de8bfa7941071c3e32eb350c7a36b6a813ffe35da82553f833a4eb475096b1656398cd45e73c157ff1ce7f76bbe274629d08e4d98f3baef9d92aa6edbae7709e6d98997b854ccc1e8ad2b4271bffe6e4f4753ffec3701901d4949d47e817ae20457abbd5979f7b013839e06b145d0cc50e2891cacfc28d20ca5a8480e3d50ae1631093df36f5e72740760ce2ebf2ebe0c57954d466a3f083c90a1507eff9435fe173ed364553212080a12e6cc0f6eb29507e126bd0cce96d4a490394e713937857cc00b1a37a71aa33750407e520cf078a8e3e8234e0137eed22004250cf7105074eb1b5b3cf2be10118f12521ccb135deb5efeea3312f447b8af76e51ceb0c57f1bb571ba62f8c9d8ec36d81f89f273c21bf24d31bd353f1fb5ff8c394faf96f46fd94c038dd2aec18a9ea4650c5ed4b5996a8246a005ba526f301b461e5933cf01b0fbb7281dabd180eba231e232a5dee95d04bd76ca08a227389079945ab94dd93958b10514e3416f0e464cfcadb696cb2572ccfb0048521152b180fbb7e4b7dbcced86379e898943686cd2167ea4ac8bda665cf9f50e1f33c689973ee789bd90b6162930602c9bfd8e1dd9b2672630cce52b5fc920f23c06a753e26a6dbda816a8d5070c06ac363285c5462b510212ba4ca3446cfa1e9df03ced8d30e9c64b6078a3dea8aed32a0e9075f060fc84f7b3843b153e688c10b55c0a9cee34954d9f643eaf5a63937884306617ea816b968dbfee5aa13e13edf6bead6f2366776a9b544b366ed6193ae9e419dd254a8d27543223ac59273ab4040b2b1f51dbd0d3985d76eb432a37fa836abb927872c3f9b6d9ccd0a5410c4d3d1765b09f840131c9629e0bc9a4fcf3d733b2d7304c7eb93136d17e14fd48982ca66eed0e52114f54111cbed27b0216d1981ea3f55e44edaca54c19353167b43031134452b4ec3d35f76fb329087fd0d35ae2798e23ebfeed8f8986323234c13935763577d2aca0fca28ccadada692c2c61cba0ef3f7bd639e178a7943cc0f6cab3699a511cb422a69983a93b943a84aad328e06921bf4fa044ef47df2c77dd4f06706f43b0ee08d4e9c99e465ee92d4f122cf1781785135ffb450b88c7bdec8c292779ab52e927a74f6368dc4b7198f1fe93de3e3ae0f5a92d893b59ddc33b3b2c34d95e3a51cbd909f5f2d83a2843b5293ce7c097ba96b37700b80a97a5c2e1f1cc7a533df1dfbf28843fc97f19f8740536ffa313461d2416945b3108b4b2e3637cf286d730de927d4a6f50c3cec336d11b7b3be307aab9d657bcc48ccd6156ecee2cfd391d46ae986c7436d102e89fd2730586f883c58a4aa4d68d21aaa71973c476d43761c53846308e9b2573a3df7f7262d33e6967c66f6f77cb132c7a8edde2b758d3e747931767a0462db6146f27958018f5b9400d1cf67dae39b36e5b246a67d7f2df4005c66e1fa7fbc8656b5ce022c669e1aaedf04992bf389affc49304875f25bfabbc3502510224fde062417f42daad6593744a93d052eae961d5ef8bd4c7f486517e4cfc21da2cf7c1cba12c95d5e3220540141f246b545aedafbfb61b1c65d54a0af2166b1bae0039f34809a70bbed48f9fad83257ddd6d00a721746a561a8de1616f5cf3314a33ae96fd40924d03fe8500c62993968b77c2ce51e06d471cb6a00830b1aae6fc7750dc027f56afb132d4107b6911b5432e400005831289883a5d3828467e7b8a2581dacc4b04c342f092fc19b4557bd3bda05a3e6c70c4f48dbd78e32e31e2cd29fe12ad71e815adc183fcef30ace1add1e655827be834f532ff476cd02f862e0a86b93dade88bb3e1cccf8f4c9041eccd019ad1926805730ade5d6abb147d2864b7519033f3b6cafbe98d24dc968dd32bb8a3dbebd06f8ec01c3cf7f3cf649d7f8434fecff4f6774426965d94cb5e41fa36d84c106046b3ebf6ff19a255735471aa0fccb13e22a17935454ffdaf22c99a9c632ac1b509e4e67bcef3065f70ef665f0f4b0fb2954710370efaaaa6d0f4856ecacbd69edc9ecfd79f06b8f1ddcedf3cfbfb39b10501a37a1718e8cc329cbf6952988cd2849190e20ca4ab3290df3b925536f52625dfa55e73cc838777303d08f547ced1dbf4119310367915193aa6f47165a99863ccaf4793d0afe2ceb03e70eaf0ca7f1132f4702c6953778df49671b8c887f2e0c8cacd39fc336d5130c5140a8db4722ffd892a03000de7b5c5809c811d3475966eead14dbce2862799a2e38544579cc7ae129f0", 0x1000) getresgid(&(0x7f0000001200)=0x0, &(0x7f0000001240), &(0x7f0000001280)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) dup3(r5, r6, 0x80000) setuid(r4) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000010c0)='./file0\x00', 0x9, 0x1, &(0x7f00000011c0)=[{&(0x7f0000001100)="7fbcaa89f66a7f7d5b749fcf47d3cc726a76593c86ee6da386ed9f738bc618e0e44463d04440053e25d356a47910fd420b9fcdde27d9c527f885ac662d3694a5a413c4e9b1fc7b71ba88e740b1c74d3d8c6511ff761ac81fe941febae2b144638ac7efcb2165626da5bae6c3d73f46a42d6b2b15c4f88816921208f8fda290ffdefe2c3d9915b40b3b116cdc0cfb4d1aadec", 0x92, 0x6849}], 0x100000, &(0x7f00000012c0)={[{@part={'part', 0x3d, 0x2}}, {@gid={'gid', 0x3d, r2}}, {@dir_umask={'dir_umask', 0x3d, 0x7f}}, {@codepage={'codepage', 0x3d, 'macromanian'}}, {@umask={'umask', 0x3d, 0x800}}, {@uid={'uid', 0x3d, r4}}, {@creator={'creator', 0x3d, '_c\x00J'}}], [{@seclabel='seclabel'}, {@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, '{$'}}, {@permit_directio='permit_directio'}]}) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) [ 2662.726602][T29822] could not allocate digest TFM handle tgr128-generic͘7T! [ 2662.742383][T29777] could not allocate digest TFM handle tgr128-generic;$B [ 2662.810654][T29891] could not allocate digest TFM handle tgr128-generic [ 2662.810654][T29891] [ 2662.836882][T29907] could not allocate digest TFM handle tgr128-generic͘7T! 18:43:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generica\xc8u;7\xa5Y\x1b\x00'}}) 18:43:18 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x5a8500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x18080, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) 18:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\x00\x00\x00\x00X!\x00'}}) 18:43:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\v\x00'}}) 18:43:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='\x00\x00\x00\x00^4\xfd\xb5mem\x00', 0x40003, 0x0) r3 = socket(0x2, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x28020800, &(0x7f00006f7000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0], &(0x7f0000a8a000)=0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f000059aff8)={r7}, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r6, 0xc0385650, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'veth1_to_team\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x8000000}}) r8 = socket(0x2, 0x0, 0x0) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) write$P9_RSTATFS(r9, &(0x7f0000000140)={0x43, 0x9, 0x1, {0x6, 0x401, 0x10001, 0x3, 0x6, 0x7fffffff, 0x5, 0x20, 0x9}}, 0x43) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f00000000c0)={'veth1_to_team\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x8000000}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) fallocate(0xffffffffffffffff, 0x4000000000000010, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) 18:43:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe45a74de10115627, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2663.538384][T30089] could not allocate digest TFM handle tgr128-genericau;7Y 18:43:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic8\x80\x9ft\v\xfa\x82!\x00'}}) 18:43:19 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x96\xa8\xfbmc\x1ca\x1b\x00'}}) [ 2663.928111][T30108] could not allocate digest TFM handle tgr128-generic [ 2663.992608][T30212] could not allocate digest TFM handle tgr128-generic 18:43:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c000210f13b0e00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c001200080001006772650010000200080010000000000004001200"], 0x3c}}, 0x0) 18:43:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\f\x00'}}) [ 2664.229459][T30332] could not allocate digest TFM handle tgr128-generic8t ! 18:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe464488427871791, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:20 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x1015, 0x1, 0x8, "34679ee98243a7dc67eceea65affb99f", "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"}, 0x1015, 0x2) [ 2664.348889][T30450] could not allocate digest TFM handle tgr128-generic8t ! 18:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic!>\xb5b\xdd8\x8e!\x00'}}) [ 2664.592537][T30412] could not allocate digest TFM handle tgr128-genericmca 18:43:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) modify_ldt$read(0x0, &(0x7f00000003c0)=""/4096, 0x1000) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0xb, r1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="b8921314291a3c4e4338bd553c3c0040ecb6fd43c43f8050b455c0a4bc3f597f0ac9852d5cd0968d75f430cf2bc363f1074cc7df6c24efbde18682bdbf02cc13e6d743ef8e92a4a38a352915200da92576c60bebb41e3f896c3efb1f095f75f45d09e5a92bd2beb09f805788a821f76350ae69a10d0861910a876874ad7f202d7475576caa71cc5ead30213aa99b8c8ed4ee292ff229d9467b7416b8668fc3c1667d1b56fc254773daa5ebc6e182560a8e45568abf91b32a", 0xb8, r1) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'em0systemem1!', 0x20, 0x4, 0x20, [0x34, 0x36, 0x65, 0x65, 0x31, 0x37]}, 0x3d, 0xfffffffffffffffa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e6400"/33], 0x3c}}, 0x0) 18:43:20 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x18000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="c53416ad7a14cb5efc3b0cdd67eda81f851ead38d6be1db3a6a24698414d08e407468b0914305b64044bdff9508c658ac4c77ed1022ed85c6a676785de51d59bc180efa203daf3eb0c6291630411cd75f6326e78f94433c9e4d90aba32919a97970b36d13ffaeb15514fd6814e0252b50f726d9f9e9f6b3ced9e7bd635e3a8287ce67b36e47a0bc65f9e5dcbe22147eb3284c30d2ff96f13c11921b64a55c58a1dd54d08183143c7a1d6214afa3e6b2c0767a93ba9aedd69b11fede622432e0d6975b4ea2d745d5bc12d4e0dde524d2b9383e14e76bb0ad65bb86d65d15adcb027c72061c1fc2637ea9c3e860ac5aa58f15c267deb834480") clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericZ\x012}o\x80h\x1b\x00'}}) [ 2664.970920][T30684] dns_resolver: Unsupported server list version (0) [ 2664.977988][T30626] could not allocate digest TFM handle tgr128-generic!>b8! [ 2665.009412][T30481] could not allocate digest TFM handle tgr128-generic [ 2665.045872][T30687] could not allocate digest TFM handle tgr128-generic!>b8! 18:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe483ca9841eb02aa, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2665.177385][T30730] could not allocate digest TFM handle tgr128-generic 18:43:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xff)\xbb\xac\xafT\x9a!\x00'}}) 18:43:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@uid={'uid'}}, {@creator={'creator', 0x3d, "b54f369f"}}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x11000, 0x0) ioctl$KDDISABIO(r1, 0x4b37) 18:43:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\r\x00'}}) 18:43:21 executing program 4: r0 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0xb, r0, 0x0, 0x0) keyctl$clear(0x7, r0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)) ioprio_set$pid(0x1, 0x0, 0x200007e35) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0xffffffffffffff6a) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x20000000003, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000080)) [ 2665.647935][T30774] could not allocate digest TFM handle tgr128-genericZ2}oh 18:43:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe49696ac4b20bc5c, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2665.710053][T30954] dns_resolver: Unsupported server list version (0) 18:43:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericj\a9\a;\xe7\x8b\x1b\x00'}}) [ 2665.797573][T30900] could not allocate digest TFM handle tgr128-generic)T! 18:43:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x1}, 0x16, 0x1) syz_mount_image$ntfs(&(0x7f0000000040)='\x83x\x00\x00\xa8', &(0x7f0000002b40)='./file0\x00', 0x2, 0x0, 0x0, 0xf7e3f3472e166ee4, &(0x7f0000000000)=ANY=[]) [ 2665.874873][T31063] could not allocate digest TFM handle tgr128-generic)T! 18:43:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000001200)={0x4, 0x7, 0x4, 0x70000, 0xace, {r1, r2/1000+10000}, {0x4, 0x1, 0x3f, 0x3, 0xf9, 0x3, "49b71acd"}, 0x4, 0x1, @planes=&(0x7f00000011c0)={0x80, 0x0, @mem_offset=0x81, 0x3ff}, 0x80000001, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000001280)=""/132) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$kcm(0xa, 0x2, 0x73) sendmsg(r5, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x29, 0x3b, 'v'}], 0x18}, 0x0) sendmsg$key(r4, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000000)) getpid() r6 = gettid() capget(&(0x7f0000000000)={0x19980330, r6}, &(0x7f0000000180)) ioprio_set$pid(0x1, r6, 0x402) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000040)={0x5, [0x6, 0x3, 0x3, 0x3, 0x2]}, &(0x7f0000000080)=0xe) r7 = gettid() capget(&(0x7f0000000000)={0x19980330, r7}, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) ptrace$getregs(0xc, r7, 0x80000000, &(0x7f00000001c0)=""/4096) [ 2665.990496][T30914] could not allocate digest TFM handle tgr128-generic 18:43:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic`{\x16\xe8\xda\"\xbe!\x00'}}) [ 2666.072668][T31142] could not allocate digest TFM handle tgr128-generic [ 2666.087819][ C1] net_ratelimit: 16 callbacks suppressed [ 2666.087830][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.097730][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.099381][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.105013][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x0e\x00'}}) 18:43:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe4a46af305b659b4, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000060400000000000000000000090100000000000000010000040000000200000000020000000000000000300000612e00"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x1}, 0x20) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x28000, 0x0) [ 2666.438804][T31139] could not allocate digest TFM handle tgr128-genericj9; 18:43:22 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2000000000000000, 0x400) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x20000000000001cc, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000100)={r1, 0x2}) [ 2666.549158][T31231] could not allocate digest TFM handle tgr128-generic`{"! [ 2666.636924][T31369] could not allocate digest TFM handle tgr128-generic`{"! 18:43:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xffMRw\xd92\x8c\x1b\x00'}}) 18:43:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xd04\xf7>-.\xce!\x00'}}) 18:43:22 executing program 0: capset(&(0x7f0000000080)={0x24020019980330}, &(0x7f0000000000)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfffffe3e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x25, &(0x7f0000000040)='trusted\xa6-posix_acl_accesscpuset$!\xcb\'\xd7\x00', 0xffffffffffffffff}, 0x30) fcntl$setown(0xffffffffffffffff, 0x8, r1) 18:43:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe4a4d0936bae4009, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2666.856480][T31373] could not allocate digest TFM handle tgr128-generic 18:43:22 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x20000000003, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000180)={r1, 0x0, 0x1f0f52a71e47797b, 0x1000000}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x88200, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40, 0x0) r6 = gettid() capget(&(0x7f0000000000)={0x19980330, r6}, &(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000280)={{0x1, 0x0, 0x8, 0x9, '\x00', 0x7fffffff}, 0x2, 0x8, 0xe5, r6, 0x2, 0x0, 'syz0\x00', &(0x7f0000000200)=['\x00', '/dev/dlm-monitor\x00'], 0x12, [], [0x5, 0xa56, 0x6, 0xc9d]}) [ 2667.095170][T31501] could not allocate digest TFM handle tgr128-generic 18:43:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x0f\x00'}}) [ 2667.208537][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2667.214498][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2667.246992][T31457] could not allocate digest TFM handle tgr128-genericMRw2 [ 2667.318927][T31494] could not allocate digest TFM handle tgr128-generic4>-.! 18:43:23 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x400000, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x22900, 0x0) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000000180)={&(0x7f00000000c0), &(0x7f0000000100)=""/89, 0x59}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r2, 0x80044dff, &(0x7f0000000200)) r3 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x3, @null}, [@default, @remote, @null, @netrom, @bcast, @null, @null]}, &(0x7f00000002c0)=0x48, 0x80000) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x1c) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000400)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000004c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r6, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="ed9272d6a638789af3377b852b675135"}]}, 0x28}, 0x1, 0x0, 0x0, 0x40020}, 0x20000080) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r9 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ocfs2_control\x00', 0x2, 0x0) ioctl$USBDEVFS_IOCTL(r9, 0xc0105512, &(0x7f0000000680)=@usbdevfs_connect={0x9}) r10 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/nvme-fabrics\x00', 0x888342, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000700)={{{@in6, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0}, &(0x7f0000000880)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x19}, 0x4e22, 0x1ff, 0x4e23, 0x0, 0xa, 0xcde69293ec64a34a, 0x10, 0x29, r11, r12}, {0xffffffff, 0x7f, 0x401, 0x2, 0x9, 0x6, 0x5, 0x7}, {0xd6, 0x1ff, 0x0, 0x4}, 0x1f, 0x6e6bb7, 0x1, 0x0, 0x5cfeda9c42c1fe78, 0x2}, {{@in6=@mcast2, 0x4d3, 0x32}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x11}, 0x3507, 0x3, 0x2, 0x2, 0x66bc15b3, 0x80000000, 0x3}}, 0xe8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0x10, &(0x7f0000000ac0)={&(0x7f00000009c0)=""/236, 0xec, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b40)=r13, 0x4) r14 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/vcsa\x00', 0x4, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r14, 0x29, 0x20, &(0x7f0000000bc0)={@mcast1, 0x8001, 0x1, 0xfe, 0x1, 0x2, 0x3}, &(0x7f0000000c00)=0x20) r15 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ttyS3\x00', 0xa4802, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r15, 0x541c, &(0x7f0000000c80)) r16 = openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x101040, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r16, 0x12, 0x2, &(0x7f0000000d00)=""/172, &(0x7f0000000dc0)=0xac) 18:43:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x84\\g\xac\x84\x8a\xb2\x1b\x00'}}) [ 2667.429609][T31641] could not allocate digest TFM handle tgr128-generic4>-.! 18:43:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\x00W`\xe3\xdb!\x00'}}) 18:43:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe4c2a2f5c2654b35, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:23 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x7ff) ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment={0xf479b05d785182b, 0x0, 0x0, 0x0, 0x0, 0x2, 0x64}, 0x8) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x20000000003, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={r7, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r7, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r8, 0x90, "f664ebedbd834ff12c1d3a622503fc451a564fe73bd07dbc790fb92722f9c8eb803aa6991e927b673949d9f401b8c3646cee0d7363043a86c104483f1188ea97f8bdcb0b6d7f5f3539f6ecf270036095b51ab5c8781a4aa2fa96f71ba0be58c13f7002f7fcffcdbb2372a95325ec71d0c29973882d0ae4ff1cb8c15130d5200f26343ac8a20a706d7e8141c10f1bec95"}, &(0x7f0000000180)=0x98) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2667.608904][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2667.615757][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2667.623431][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2667.630165][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:43:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xdb\xe0\x17\x9aD}\xec!\x00'}}) [ 2667.965877][T31738] could not allocate digest TFM handle tgr128-generic\g [ 2668.002615][T31712] could not allocate digest TFM handle tgr128-generic 18:43:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x20000000003, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r6, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r6, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x1000, 0x100}}, 0x28) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000000)={0x200000000000040c}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 18:43:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic<\xee|Sn\x06\xc1\x1b\x00'}}) 18:43:23 executing program 4: clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x1, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x8, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffa, 0xf, {"b8aa27a7b9b2c0aa5f65a9b2d00bf109"}, 0xfff, 0xb45d, 0x2}, @in6={0xa, 0x4e23, 0x4, @ipv4={[], [], @remote}, 0x5}}}, 0x118) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000200)={0x7ff, 0x4, 0x1, r4}) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2668.150226][T31734] could not allocate digest TFM handle tgr128-generic 18:43:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x10\x00'}}) 18:43:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe4d8e4698beca4e6, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2668.512165][T31965] could not allocate digest TFM handle tgr128-genericD}! 18:43:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000440)=""/4096, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x2}}, 0xe8) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000580)=ANY=[], 0x0) r2 = dup(0xffffffffffffffff) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "48a888ff2a3913cc", "3fd2effc0e6d4b86d270adc24e6a85f2", "610623a3", "0f79c4b15f70d643"}, 0x28) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030f47843535af3a81cd057ef622662eeb208b33f209975e2c24316681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1e80638e5e3e864b8946f30fd18faa16f02b2830982be94b57040000000adf47df042c760c0a30323e7ab4db2dca67b190473732ca374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2fa7aa1c9545a9b824d13fed5a717db5585e8cef0e890868ecdc300b433fc5f1ec9ea680da4e37ef2003863141f00000000000000000000004755480a833336285d72d16c7f4c6b294f4de197c8a112481ac51245774d5af37f79ee76304ee1367287e0"], 0x108) r3 = dup(0xffffffffffffffff) ioctl$USBDEVFS_CONNECTINFO(r3, 0x40085511, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) fstat(r4, &(0x7f0000000040)) sendmmsg(r2, &(0x7f0000008440), 0x0, 0x8000) 18:43:24 executing program 4: ioprio_set$pid(0x2, 0x0, 0x6) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x4, &(0x7f0000ffa000/0x4000)=nil, 0x1) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfffffe3e) write$P9_RCLUNK(r0, &(0x7f0000000000)={0x7, 0x79, 0x2}, 0x7) [ 2668.645128][T32183] could not allocate digest TFM handle tgr128-genericD}! 18:43:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xd4-sWOK\xfa!\x00'}}) [ 2668.825713][T32027] could not allocate digest TFM handle tgr128-generic<|Sn 18:43:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe4e77de468669a09, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generictH\x00x\r\x8f\xe6\x1b\x00'}}) [ 2669.024061][T32179] could not allocate digest TFM handle tgr128-generic 18:43:24 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x20000000003, 0x0) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000180)) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x27c2fcec604de9d3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x500000000000000) syz_open_dev$char_usb(0xc, 0xb4, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) io_pgetevents(r5, 0x80, 0x8, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x7}, 0x8}) socket$inet_udp(0x2, 0x2, 0x0) 18:43:24 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x2f6, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff3000/0xb000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)="e7c25a846b3b5d910b269cc58f5b09f0f6ffd8b828d5230ad2504bda8063b41c30aacb99f51c3c0df91f4ff4905c3f362198976de5ce575fbdfc5e51fecdfa9f45f3fd7c1282ec54e1504f7efb5ef863b0a702097505c60a7b0ae355c6dc88f62f", 0x61, r0}, 0x68) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2669.196253][T32189] could not allocate digest TFM handle tgr128-generic 18:43:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x11\x00'}}) [ 2669.351809][T32322] could not allocate digest TFM handle tgr128-generic-sWOK! 18:43:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe4fb7a6e6795b5ef, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2669.471967][T32423] could not allocate digest TFM handle tgr128-generic-sWOK! 18:43:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x02\x18\v\t&\x90\xfa!\x00'}}) [ 2669.550521][T32418] could not allocate digest TFM handle tgr128-generictH 18:43:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericI\xbf\xea\x05\"\xf4\xe6\x1b\x00'}}) 18:43:25 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000180)) r1 = getpgid(0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x8440, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x480280) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000080)={r3, r4, 0x3f}) prctl$PR_GET_CHILD_SUBREAPER(0x25) [ 2670.005540][T32436] could not allocate digest TFM handle tgr128-generic [ 2670.032229][T32445] could not allocate digest TFM handle tgr128-generic &! 18:43:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe522378038d2172e, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2670.111817][T32661] could not allocate digest TFM handle tgr128-generic [ 2670.128233][T32664] could not allocate digest TFM handle tgr128-generic &! 18:43:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic(\xfdw\x85\xe8;K\"\x00'}}) 18:43:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x13\x00'}}) [ 2670.251615][T32656] could not allocate digest TFM handle tgr128-genericI" 18:43:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0xfffffffffffff800, 0x0) r1 = dup(r0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) mlockall(0x2) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f000000a000/0x3000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) r3 = socket(0x10, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040), 0x8) r4 = socket$inet6(0xa, 0x3, 0x10000000003c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0xfd5c}], 0x1}, 0xc100) sendmsg(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="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", 0x134}], 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpeername(r3, &(0x7f00000009c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000a40)=0x80) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r6 = gettid() capget(&(0x7f0000000000)={0x19980330, r6}, &(0x7f0000000180)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r7, 0x0) r8 = fsmount(r7, 0x1, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) r12 = geteuid() r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r16) r17 = gettid() capget(&(0x7f0000000000)={0x19980330, r17}, &(0x7f0000000180)) r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r19) r20 = gettid() capget(&(0x7f0000000000)={0x19980330, r20}, &(0x7f0000000180)) r21 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r22) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r24 = socket$alg(0x26, 0x5, 0x0) bind$alg(r24, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r25 = accept4(r24, 0x0, 0x0, 0x0) splice(r23, 0x0, r25, 0x0, 0x20000000003, 0x0) statx(r23, &(0x7f0000000340)='./file0\x00', 0xa00, 0x8, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = gettid() capget(&(0x7f0000000000)={0x19980330, r27}, &(0x7f0000000180)) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0, 0x0}, &(0x7f00000010c0)=0xc) r30 = gettid() capget(&(0x7f0000000000)={0x19980330, r30}, &(0x7f0000000180)) r31 = getuid() newfstatat(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) sendmsg$netlink(r5, &(0x7f0000001240)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x206002}, 0xc, &(0x7f00000002c0)=[{&(0x7f0000000440)={0x258, 0x2c, 0x200, 0x70bd25, 0x25dfdbfd, "", [@typed={0x8, 0x41, @pid=r6}, @nested={0x144, 0x38, [@generic="32f443678a5eae73067be2211850c0a9ecfcd193d6cb06e4d12cff881ace41b10e26079c14b1b7b25e8a480962100873963d364e68d5", @typed={0x8, 0x3e, @fd=r8}, @generic, @typed={0x8, 0x86, @pid=r9}, @typed={0x8, 0x1, @ipv4=@empty}, @typed={0x8, 0x24, @u32=0x27}, @generic="1b184bd511875ab76dec5dc4488eb54b189ba13509b6ef6aba578aa71d08fd3e6989615b28b1597b9a4656a2836de2b2a6a91ff499de597528a8c3b8defe8d59f0ebd7d737c04414ba310245a0e3a7d9120ce9e42127e0489719c0ece0c2c26f0c9d78087d431a6ee1b4df113fca5e8f50d4f5d35a2ccbcf89340a096c2e0dbdf90e24b334b165288cec673b6702a68a37bf740f2539909821e994b172dead30d86a430d5578c7bb3136504782c2b4ea617648269b1f5c7e397f00938fff6071fd01d8e7ae09642d0301df85689917", @generic="9ebe95e4f6bdf7c6eaf520eec79d116fc727f81bec653ad7"]}, @typed={0x8, 0x1c, @uid=r11}, @generic="75305bc0d417e6bdc1a77efa1b2d5acefb73bb352d81021edca5408573cd9e465d614762b7359fcf99699e7361685b6c2221b5b2174f49d8571111caa14972f5435ec4e5118f17fad4be1c6285b2ee73292b13f00be5a5ede08bc359d13c607c1dfb49ff5a66e23b25b0f04b2daf779cb8851f0c55bb7b0136a924de148f0628a8fb3cf65af3c15ea62af0110e176769c1aee59e8cafda736cebe486f776edf8c6461e440657101d4436aa49235a40ac84afb21244dd00f970daa5f51fb8e956be47ab47d919d25be74548a4ae0bfe777b7bd06d555d3169", @generic="9e89ee1a31461b72bafbf92e17134dc71fe9237e4149250b83", @generic]}, 0x258}, {&(0x7f00000006c0)={0x1b4, 0x37, 0x100, 0x70bd2c, 0x25dfdbfc, "", [@typed={0x8, 0x1a, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}}, @generic="f48b6055291d8975343f03d7deb6b289ed2e35d04f5189f3d3303e9eae3d1d8f878aa64ee5246c2b8f9a23b5128f4051ffedcfa5f2ef853850ee2573f0cb6e82e6169324b88e16dce7914822cdd0848e8368cd97219dd849951c32199148a10668c439139045fa0614f3f52d4233028d9c6136a8be4a336c1a737b3962c120a3fe203155322e18cd7667eb092b0de1377f61315b7f270c436204867504cc25f9ce57867060cd005adfcebbb1863b9e37baf257f597c34fca88d4bfc6ed8089face68", @nested={0x10, 0x4e, [@typed={0x8, 0x63, @uid=r12}, @typed={0x4}]}, @typed={0xc, 0x19, @u64=0xffffffff}, @typed={0x8, 0x20, @uid=r14}, @generic="34097c03e0a1da3714deeb3134e4609d3ba66a0cb2e2956c2f6ae7239de526357a07150c94e6389a94d87b6046481ce9b093df057b27864ee80f288f", @typed={0x8, 0x92, @str='\x00'}, @generic="5f080d326445328586bd70bfdbe317e2e7517c9a19bc08e2385a1bad2761813c1c8f7d3778cd0ec0de26e1daf6b66ace0be7338f3cc1fb56123c67808150e4bf243d21679cb164b9f3f6ab4506ad90824e43690970dc5119fd3bfcdbe292d35e34a9a7d9541b6292d87662951f7d60d8"]}, 0x1b4}, {&(0x7f0000000240)={0x30, 0xa06, 0x100, 0x70bd2a, 0x25dfdbff, "", [@nested={0x18, 0x89, [@typed={0x14, 0x48, @ipv6=@rand_addr="2db5b6858f573723ad0da1a98cffd53c"}]}, @typed={0x8, 0x28, @str='[/\x00'}]}, 0x30}, {&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000002f0000082abd7000fddbdf2514005df788553bfaef18af0000000000000000164a04812e1dcdb0994e18e46b48f18ea55ef801f299d21400"], 0x3c}, {&(0x7f0000000a80)={0x588, 0x30, 0x0, 0x70bd2d, 0x25dfdbfc, "", [@nested={0x2b0, 0x20, [@generic="7c8797512522403b93b89733bee1fa545880b7023d6b0b7ca4f8d81c4af96192672e8417683e0324a369445feb1145a6aa47a61d329ac18ee1ac0a10524c2cdad88de15f200d9c7aeec1f03d5f851dbe096db905586c981e1ace8d1f8d040c3dee54d33ca54d982ff69ac9badc1431bcbec60dcbdba4d2c16098c154256ba17441cc198f58d56693119079aac534374e7fb74704bdea87953870544766d97c1ce0984b7ade991d3a72aca1505e0d7450f50d", @generic="ed9a16dc765f8c3d0acd980d61f728ef7bf7b7a4d2ed4e3e934ee5220854e28e857f4dc9cbe62d35106aabe48805017e6fd6721bfc2fb6a336734096ab696fea242aecc7a162f3eba7020b1df3ef7cfadc454ca22c4ebad6b4bc870e0b87b1d90c93a044a0eb", @generic="678012c93f92e6554ef3ce2092f1d852dc99ed83dbac79e97b20b320a0bc2cf9d124cc8c219dd49d68cc76153c46d14ea23f163f0d62af04cdc1b810298ceec43e11b4b4b3c0b2e9efe76184d8fdfbde1e0a79ea2fb6ce79acccd99d731dd53fa60932215b2d493c7c4b2e26d12cf05ef3e768b4b9b8e3d52f37dccb310a70d96f9ec4a68629055ebd2856f98e575485f90f0f51f487b18ac9ab47d71dac511409f23dba3a106bec7cf24d00246c2de797cd6e4950072f606ecf6c44aa180619927a4050947b4a02183a12c84c6ae317e9afbe73ff98fed91ebc6ef370f1d7eb2acf2c5abc3cee5ef2717e6a9731f31d", @generic="f245bb3a6bc4d5fdbc616605db35eba4dcbc21fff2f0fee8352e905a72f2591ae4ddc845ba8b24ed0abdb35984024f68c99584751f680199f77869b8bcef3ec56177d6546267de75bf03d44782001fc7ad903385f040607a4f44e76de91897916cb7f02cbe6593df39a022f75c718538fd0198f4d29e50361dfc5e2f1be65151d93f8ec70acb5ef7383724791d38cb754a14d9c680501ef8cc08918f8e98780b7eabde"]}, @nested={0x1f0, 0x6c, [@typed={0xc4, 0x55, @binary="451091fac082d1c8b94b8616b53daddd8a0f5549d8ce5bd89a87d8a8dd95f37f5fe6ef6f4c3d67113188545165d19751aa6710b2436034c9470aeedd321b1491681043cffe4c3b1fdc870f22298874cee8def6d53cc1b677ba9b1b3437312369a8eb0a9ff953c058f4f9be4aa67f3fb9c9cf6363a1c51dd6e11fe65c371b2da7211dc061e9cdc498fbd23880a8a00c30a2fbeb6311bbc80d32b4dd72b299ae090ac47ada8903090f2b4f5f693f18908400654cbdd7d56a2b60d1ff9d457ab1"}, @generic="2b7975d3f65f0913a97b8170f35270d6da2958013fb3dd7377132b30d74274347f09721b5d4e0a82acc3dd9341082e2258f755cd9f4d2dbf3e5ec78485de5ccfe114fa7a6b3cd193995c138216935cb92e673a678b04e91579cf523188dc045b3c45a7cbb6c48d5340bc7e0ccdd04b91f05f", @typed={0x8, 0x8e, @uid=r16}, @generic="ca0dcaa9ffe43855e4acef5f7041f8af2402c5403e2750a9a349f6c6a45da3d607013dfee79dc9684297723a770b97ea70aadd97710ea24619b242740db797116413d92398bab070fc2841e78e84507e1953da2f75d9516491d7256a85f82021b26ddd01e13273bcb2149c056b6d897e47a76eeef7ffb5e416dd848347483a844d588847259f4cd31ad828e8eb4da5e28f34d685c4d4", @typed={0xc, 0x3b, @u64=0x800}, @typed={0xc, 0x5f, @u64=0x3ff}]}, @typed={0x8, 0x1, @u32=0x3ff}, @typed={0x8, 0x85, @fd=r1}, @nested={0x34, 0x11, [@typed={0x14, 0x48, @ipv6=@mcast1}, @typed={0xc, 0x4a, @u64=0x5}, @typed={0x10, 0x6, @str='/dev/dsp\x00'}]}, @generic="687eefb336df9d13c2106de9fe564fc098c34973a4b2", @generic="681bb96b4e813f9d89edf8e8a38f2513cdceed207fa9cbae28d2437957baa304c0720be79adbb73192c7dac9c3502ef9b5bd7ce822272118c2ab76eaefb3b10e210930b8924b9f1bfe4f6b15ab5b72de583a2540f5a26eb2f47cb047a2fbc6c8f8025300bf11acf84e60e177cf3b14826fce9ea9ba0a7eb4e2ef4cf03109"]}, 0x588}], 0x5, &(0x7f00000011c0)=[@cred={{0x1c, 0x1, 0x2, {r17, r19, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r20, r22, r26}}}, @cred={{0x1c, 0x1, 0x2, {r27, r28, r29}}}, @cred={{0x1c, 0x1, 0x2, {r30, r31, r32}}}], 0x80, 0x40}, 0x4800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 18:43:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xa0\x05\xa6\xdd\xe4\x80\xe7\x1b\x00'}}) 18:43:26 executing program 4: r0 = gettid() pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000004c0)={0x200, 0xf9, 0xfa22, 0x1000, &(0x7f0000000640)=""/4096, 0x52, &(0x7f0000000340)=""/82, 0xd7, &(0x7f00000003c0)=""/215}) capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)) ioprio_set$pid(0x3, r0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0xfffffe3e) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x40, 0x400) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000000c0)={0x2, 0xa5, &(0x7f0000000000)="06fde2e5fa81a96f54480898a850f5e618e9a5a4f97ac8c7d14945556bf70bf7f6275085c88577e84abbf9916b326cfdb6acac63c9f54ba3186c9dc54288a1e5ad803739e978ee1451705e4261d03c71c306b4113d4e526f3ff15b45fd9d17a66793d16c25460e38e1ce67a57e931d8644303ee6706a041218a947e0ae5e4bf475f6b1e69316aa8174930361f55e4de72c2130cfa9e581d3b687df2d835936d60f3f2c220e"}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000200)={0x0, 0x3f, 0x1, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x800}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4000, 0x20) ioctl$RTC_AIE_OFF(r4, 0x7002) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@hostdata={'hostdata', 0x3d, '\xe4\xce\xd8!)\x94\xf5^\xa5\x13`\x80\xc6\xb8\x1c\xc5\x13\xae\xc6\xd2HF\xb1\xde0\xbf\xb1\x80\x980\x85\xc2\x9aYJ\x97kK\xf6\xd8\x93\x92\vq\xcbj\xd0l\x99HlW5;\xb1-\x11n\xee+\xa2\xf5\"\xf5\xdf\')\xaf\t\x84\x04\x9d(\xa3\x86\xa4\xad\xe3\x943Z_\xc6\x93\xc4v\xdd\xaf\x02P\x9d\xa2\xf9\x85\x02\x18\xf1\x95\x87\xabFB\xdc\x9f\xa8\xbd\\\xc6!46\x00'}}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) fanotify_init(0x74, 0x40000) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, &(0x7f0000000140)) 18:43:26 executing program 0: syz_open_procfs(0x0, &(0x7f00000013c0)='cmdline\x00!H\xcbvj\xeb\xc71\xdd\xf3\xf0_\\\xe7\xae\xe8\xe4\x92v8\xb1f\x0f\t\xc1i\x1e\xcf\x97X\xd7\xbd\x8b\x9et\x8c\xfb\x02l\x96\x9bI\xdb\xd7@\x1f\x98zJ\xa2\xaf\xc39\xa2>j\x9c\"t\xf5\xa3p(I\'\x96\xde\xf4\x88\x1a\xe6(\x8d\xb5\xec\x16\xde\x10\xbf\x16\x01\xb2\xd2eo\xf0\xa6\xff\xbc\x88Z\x9e\xc0\xae\xe2\x1a\xa7\xfa=\xf6JClH\xa6 \x87\xd8\xa4\xf5\xc1\xa2\x98\x10\xd2\x03\x96@\xdeu\xa3\xf8\xa0\xcc\xa1x\xe9_/_U\r\xa8\x86T\xd0\xf2\x8f\xb5\xfb2K\xa2\x1e\xa7\xf7W\xfc\b\xa2C\fZ\x01`\x19q=]\x05\xe2\xda\xcf\xf3\xbf\x15\xbeG\x15C\xe4q\x8e\xeb\x14go\xd1\x13f\x8f\xcd\xb9\xf2\xa3x\x0f~\xb7\x81ac\x15\xd2*\x02\x9f\xb2\x7fb\xe0\xf9&\a>\x05\xd2\x877\xed\x15\xa3\r \x17\xf6\xa4\'GI5\x8b\x03\x17\x9c \x01\xa4\xc0\x17A\xbc\xb5\x157\xfe\xc9b\xe5D\xbb\x978E[Vn\x93Z\xb1\xeb\xe0\x8cuvm7k\xa3\x97\xec\xeb\x19\xec2\xa2G\xb2*\xde[>\xdc\xab\xd8\x11\xd0t\xc8a\x0e\xeb') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x4000}, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000002c0)={0x5, @capture={0x0, 0x1, {0x0, 0x40}, 0xffffffff, 0x1b66}}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000080)={0xc5, "83d1d66e68d064979c21a99442725bfde98d3ef0a84962fbccab20438f3257c6", 0x2, 0x0, 0x5, 0x9, 0x0, 0x0, 0x1c29}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000010000000000050800000000000000", @ANYRES32=r5, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040000000000"], 0x58}}, 0x0) dup(0xffffffffffffffff) socket(0x10, 0x803, 0x0) 18:43:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe540e96f3fe44a74, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2670.769980][ T318] could not allocate digest TFM handle tgr128-generic(w;K" [ 2670.781014][ T320] could not allocate digest TFM handle tgr128-generic [ 2670.859017][ T502] could not allocate digest TFM handle tgr128-generic(w;K" [ 2670.906398][ T515] could not allocate digest TFM handle tgr128-generic 18:43:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x06\xa6\x85\xb2\xf1K\"\x00'}}) 18:43:26 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xcf45693bf14d5211, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x11, 0x1, {0x60, 0x1, 0x6}}, 0x14) 18:43:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericn\x00'}}) 18:43:27 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x1080, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20006, &(0x7f00000000c0)) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x7d) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 2671.219811][ T472] could not allocate digest TFM handle tgr128-generic [ 2671.368310][ C0] net_ratelimit: 14 callbacks suppressed [ 2671.368325][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.380805][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe54f92f98b26082d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericxJ\x9b\xff}1\xe9\x1b\x00'}}) 18:43:27 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x4042, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic&\xbd\xe9\xfd/=U\"\x00'}}) [ 2671.769004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.776408][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2671.784084][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.791393][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.100308][ T650] could not allocate digest TFM handle tgr128-genericn 18:43:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000000200000009607000000000000a4000000000000000000", 0xffffffe5}], 0x2) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r2, 0x1, 0x0, 0x0, {0x25, 0x2}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x3}}, {0x8, 0xc002}}]}, 0x44}}, 0x0) socket(0x0, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000000)={0x20, 0x3, 0x5, 0xffff146b, 0x8, 0x7fff}) [ 2672.312339][ T729] could not allocate digest TFM handle tgr128-genericxJ}1 [ 2672.326910][ T684] could not allocate digest TFM handle tgr128-genericn [ 2672.327768][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.333984][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.339801][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.345520][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:28 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) [ 2672.429014][ T914] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 18:43:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe550f4729f7e4baa, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic|\xb5\xa9\xe4`h\xf4\x1b\x00'}}) 18:43:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generict\x00'}}) 18:43:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$smack_xattr_label(r0, &(0x7f00000001c0)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x1) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000e0010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000000000000100008000000000751952863de52512010049d5fc0000000000000000000000000000000000000000000000000000000000000000000000d1d4087e6b513b6ff0f4aae76e6160c5f0277879742fe5b6b12245615bbd540ba1b6f09ad81e462f5ce791b95d66e375d1fab2"]) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) close(0xffffffffffffffff) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000100)={'NETMAP\x00'}, 0x0) tkill(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 2672.766958][ T760] could not allocate digest TFM handle tgr128-generic&/=U" [ 2672.897305][ T1078] could not allocate digest TFM handle tgr128-generic&/=U" 18:43:28 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb, 0x0, 0x3], 0x0, 0x205211}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0x8}}) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x10) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000100)={0x3a, @empty, 0x4e20, 0x0, 'wrr\x00', 0x10, 0x800, 0x2b}, 0x2c) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r6, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$KVM_GET_DEVICE_ATTR(r6, 0x4018aee2, &(0x7f0000000180)={0x0, 0x300000, 0xfffffffffffffc01, &(0x7f0000000140)=0x1}) socket$inet_sctp(0x2, 0x0, 0x84) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 18:43:28 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x2f, &(0x7f0000000000)={0x2c, 0x4, 0x6}) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe55ee82c92b76890, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic:8\xfaL\xb1\xa9^\"\x00'}}) [ 2673.218460][ T1064] could not allocate digest TFM handle tgr128-generic|`h [ 2673.362241][ T1161] could not allocate digest TFM handle tgr128-generict 18:43:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00&1\f\x8b\xfb\x1b\x00'}}) 18:43:29 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x5f087eebcbba09be, 0x6, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x44, r2, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80080024}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x727}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7800}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x80) [ 2673.525763][ T1261] could not allocate digest TFM handle tgr128-generic:8L^" [ 2673.547420][ T1388] could not allocate digest TFM handle tgr128-generict 18:43:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000020000535d25a80648c63940d0624fc60040003400a000200053582c137153e370900018003001700d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0xb593e0f1605aa4b8, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000100)) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r5, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000300)={0x80000001, 0x7, 0x4, 0x70000, 0x7, {r3, r4/1000+10000}, {0x5, 0x0, 0xbd, 0x0, 0x1, 0x1f, "f965cdde"}, 0x7ff, 0x6, @userptr=0x3, 0x8, 0x0, 0xffffffffffffffff}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f00000004c0)) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) splice(r11, 0x0, r13, 0x0, 0x20000000003, 0x0) setsockopt$inet6_dccp_int(r13, 0x21, 0x11, &(0x7f00000003c0)=0x200, 0x4) r14 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$USBDEVFS_CONNECTINFO(r14, 0x40085511, &(0x7f0000000580)) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="020000a7", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x7a, &(0x7f000059aff8)={r15}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000a80)={r15, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) setsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000380)={r15, 0x5}, 0x8) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000400)=""/89) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000200)={0xa0, 0x0, 0x8, {{0x4, 0x1, 0x428, 0x8, 0xffffffff, 0x9, {0x1, 0x0, 0x8001, 0x80, 0x9, 0x98, 0x8a86, 0x6, 0xfff, 0x10000, 0x1, 0xee00, r2, 0x9, 0x1}}, {0x0, 0x1}}}, 0xa0) [ 2673.634751][ T1394] could not allocate digest TFM handle tgr128-generic:8L^" 18:43:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xae\x00'}}) 18:43:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic[\x95\r\xa5N+g\"\x00'}}) [ 2673.784768][ T1425] validate_nla: 15 callbacks suppressed [ 2673.784781][ T1425] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 18:43:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe56d656897c9af27, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:29 executing program 4: gettid() r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)={0x8}) ioprio_set$pid(0x1, r0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000180)) tkill(r1, 0x13) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x200000, 0x0) socket$pppoe(0x18, 0x1, 0x0) ioctl$FBIOPAN_DISPLAY(r2, 0x4606, &(0x7f00000001c0)={0x10, 0x300, 0x800, 0x258, 0xa9e, 0xffa, 0x2, 0x2, {0x101, 0x80000000, 0x1}, {0x609b, 0x3800000}, {0x5, 0x0, 0x1}, {0x200, 0x4}, 0x3, 0x10, 0x90, 0x1, 0x1, 0xd9, 0xfffffffe, 0x5, 0x81, 0x9, 0x0, 0x5, 0x1, 0x6, 0x2, 0x4}) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x4, @broadcast, 'bridge_slave_1\x00'}}) 18:43:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic0Q\xdaY+\xb6\n\x1c\x00'}}) 18:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xff000000, 0x6e}, [@ldst={0x3, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r0 = open(0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) socket(0x10, 0x803, 0x0) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0xb, r1, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x100) [ 2674.279873][ T1565] could not allocate digest TFM handle tgr128-generic[ N+g" 18:43:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe572e2995724560e, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2674.365109][ T1637] could not allocate digest TFM handle tgr128-generic [ 2674.386739][ T1654] could not allocate digest TFM handle tgr128-generic[ N+g" 18:43:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x19<\xb2kV\xc3k\"\x00'}}) [ 2674.546609][ T1722] could not allocate digest TFM handle tgr128-generic [ 2674.566985][ T1652] could not allocate digest TFM handle tgr128-generic0QY+ [ 2674.566985][ T1652]  18:43:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xec*Q\xf6E8\x10\x1c\x00'}}) 18:43:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xf6\x00'}}) [ 2674.989672][ T1769] could not allocate digest TFM handle tgr128-generic0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe588e927686dd7a4, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2675.091773][ T1789] could not allocate digest TFM handle tgr128-generic0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic|\xafLK\x0e\xae\x1b\x1c\x00'}}) 18:43:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000002c0)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_procfs(0x0, 0x0) close(r1) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x1) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xd) r2 = open(&(0x7f0000000080)='./bus\x00', 0x430c2, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x16\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8,\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) [ 2675.537017][ T1792] could not allocate digest TFM handle tgr128-generic 18:43:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe58d48b1f83fd0af, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2675.673331][ T1797] could not allocate digest TFM handle tgr128-generic [ 2675.880749][ T1809] could not allocate digest TFM handle tgr128-genericc-PL [ 2676.004662][ T1846] could not allocate digest TFM handle tgr128-genericc-PL [ 2676.432817][ T1884] could not allocate digest TFM handle tgr128-generic|LK [ 2676.487779][ C1] net_ratelimit: 15 callbacks suppressed [ 2676.487790][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.497699][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.499657][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.505491][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:32 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xb2\x02\x00'}}) 18:43:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x83,\x86\xb55\xdc\x8f\"\x00'}}) 18:43:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe5c0bb8c2db22d3a, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xce\xf9\xd4)D\x8c$\x1c\x00'}}) [ 2677.607797][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.613632][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:33 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x410080, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x20000000003, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0x9e0000, 0x7, 0x326, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa10906, 0x4, [], @ptr=0x200}}) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000140)) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001840)='/dev/vcsu\x00', 0x4000, 0x0) accept$nfc_llcp(r4, &(0x7f0000001880), &(0x7f0000001900)=0x60) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x4080, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r5, 0xc0745645, &(0x7f0000000040)={0xf49a, [0x6, 0x9, 0xff, 0x40, 0x6, 0x3f, 0x9, 0x1, 0x1000, 0x0, 0x400, 0x0, 0x80, 0xffff, 0x7, 0x4, 0x1ff, 0xff01, 0x1f, 0x8, 0x401, 0x0, 0x9, 0x8, 0x2, 0x7ff, 0x7f, 0x4, 0x5, 0x5, 0x1000, 0x93, 0x20, 0x2, 0x7f, 0xdb70, 0x1, 0x8, 0x800, 0x1, 0x400, 0x7, 0x6, 0xd, 0x6, 0x0, 0x800, 0x1], 0x9}) r6 = socket$key(0xf, 0x3, 0x2) sysfs$2(0x2, 0xe543, &(0x7f0000000280)=""/134) sendmsg$key(r6, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020900001800000000000000000000000400030000000000000000000000000000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) set_mempolicy(0x4000, &(0x7f00000000c0)=0x3f, 0x6f3e) socket$alg(0x26, 0x5, 0x0) [ 2677.919094][ T1927] could not allocate digest TFM handle tgr128-generic)D$ [ 2677.942092][ T1932] could not allocate digest TFM handle tgr128-generic,5܏" 18:43:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe601ed348c777a5b, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2678.007703][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2678.013564][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2678.019681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2678.025973][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2678.059413][ T1968] could not allocate digest TFM handle tgr128-generic,5܏" [ 2678.102635][ T1954] could not allocate digest TFM handle tgr128-generic 18:43:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x90\xc8lgR\xc6\'\x1c\x00'}}) [ 2678.245920][ T1947] could not allocate digest TFM handle tgr128-generic 18:43:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x8c\b2J]\xa8\xc6\"\x00'}}) 18:43:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x03\x00'}}) 18:43:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 18:43:34 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80340000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(r5, 0x0, r7, 0x0, 0x20000000003, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x44, r9, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x141}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r9, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x3d}}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x240000c9) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000a80)={r10, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r10, 0x4) 18:43:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe607d0d2de3da75d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2678.960238][ T2103] could not allocate digest TFM handle tgr128-generic2J]" [ 2679.027470][ T2087] could not allocate digest TFM handle tgr128-genericlgR' [ 2679.048079][ T2103] could not allocate digest TFM handle tgr128-generic2J]" 18:43:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xac?Z\xd8\x9f\xd9\xca\"\x00'}}) 18:43:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic6I*\xa8\xe9d@\x1c\x00'}}) 18:43:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x05\x00'}}) 18:43:35 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) 18:43:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe60c000000000000, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2679.519854][ T2235] could not allocate digest TFM handle tgr128-generic?Z؟" [ 2679.617927][ T2273] could not allocate digest TFM handle tgr128-generic?Z؟" 18:43:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xb7=s\x8f\xf2\xe5\xda\"\x00'}}) [ 2679.725685][ T2238] could not allocate digest TFM handle tgr128-generic6I*d@ 18:43:35 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x1040000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @sco={0x1f, {0x9, 0x40, 0x0, 0x2, 0xff, 0x1}}, @nl=@kern={0x10, 0x0, 0x0, 0x4000}, @ethernet={0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)='gre0\x00', 0xe7, 0x200}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x3a40d7237194b5ba, 0x0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)={0x3, 0x1, 0x1}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r3, 0x0) ioctl$TIOCCONS(r3, 0x541d) fchdir(r2) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x86/\x86[\xcb\vJ\x1c\x00'}}) 18:43:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x06\x00'}}) [ 2680.178006][ T2466] could not allocate digest TFM handle tgr128-generic=s" 18:43:36 executing program 0: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) 18:43:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe61457b21c7e89c0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2680.257581][ T2532] could not allocate digest TFM handle tgr128-generic=s" 18:43:36 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x2000, 0x0) 18:43:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xf6\xcfXv\xf3v/#\x00'}}) [ 2680.496717][ T2490] could not allocate digest TFM handle tgr128-generic/[ J 18:43:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericq\x0en\xac;\x15g\x1c\x00'}}) 18:43:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\a\x00'}}) 18:43:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000540)=0x2000000000000074, 0x56c) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4ea7, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, r1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f00000002c0)={{0x1, 0xd4, 0x8, 0xff, 0x1, 0x40}, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write(r0, &(0x7f00000001c0)="ee0107200c9f8fbf5ca312794d57d7c84858f6d02ac7044478a1ceaba80c756a581354e1c3bc0f39ab71266531e5c6b4d607559441a2a1492bc86146e4a205b0b8db310441cf08c043a775bb5e3a82dbc589f50c52e15266c634790cab6745980751ca698dbd91bc", 0x7f37) 18:43:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6163b632d2772e3, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:36 executing program 4: ioprio_set$pid(0x2, 0x0, 0x401) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2680.919503][ T2715] could not allocate digest TFM handle tgr128-genericXvv/# [ 2680.978081][ T2842] could not allocate digest TFM handle tgr128-genericXvv/# 18:43:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xa8\xaf\x02\xfa\xc7\xe51#\x00'}}) [ 2681.170921][ T2836] could not allocate digest TFM handle tgr128-genericqn;g 18:43:37 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x100) pkey_alloc(0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000100)={0x11, 0x7, 0x2, {{0x4, 'self'}, 0x4}}, 0x11) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) 18:43:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x04\xb5w\x9f\xde\x96\x7f\x1c\x00'}}) 18:43:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\t\x00'}}) 18:43:37 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x145) 18:43:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe61f790b2bc01973, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2681.557126][ T3057] could not allocate digest TFM handle tgr128-generic1# [ 2681.651619][ T3185] could not allocate digest TFM handle tgr128-generic1# 18:43:37 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2681.767700][ C0] net_ratelimit: 13 callbacks suppressed [ 2681.767710][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2681.779271][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericE\xcd\x97\\\x9bF]#\x00'}}) [ 2681.891906][ T3153] could not allocate digest TFM handle tgr128-genericwޖ [ 2681.968187][ T27] audit: type=1800 audit(1577299417.730:202): pid=3309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17195 res=0 18:43:37 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="1cd51e24274d359fd0babbb0369138efd55d", 0x12) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericE\xe6gM\x06\x92\x81\x1c\x00'}}) 18:43:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\n\x00'}}) [ 2682.167712][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.173582][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.179489][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.185298][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:43:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe63e78e3d873d460, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) shmget(0x0, 0x12000, 0x0, &(0x7f0000fee000/0x12000)=nil) r0 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffa000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000001000/0x3000)=nil) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0D\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r6, &(0x7f0000000140)="05", 0x1, 0x4004001, 0x0, 0xec) splice(r6, 0x0, r5, 0x0, 0x10000011001, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x26, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan1\x00', r8}) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) [ 2682.239393][ T3325] could not allocate digest TFM handle tgr128-genericE͗\F]# [ 2682.317003][ T3466] could not allocate digest TFM handle tgr128-genericE͗\F]# 18:43:38 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x10100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericGb\xeaA\b\xaff#\x00'}}) [ 2682.694972][ T3471] could not allocate digest TFM handle tgr128-genericEgM [ 2682.728039][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.728129][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.734400][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.741650][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x1f`\x19\xe9B\x96\x8c\x1c\x00'}}) 18:43:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6702a5ff537c2c1, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:38 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)) r1 = gettid() capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000180)) tgkill(r0, r1, 0x3b) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\v\x00'}}) [ 2682.957068][ T3573] could not allocate digest TFM handle tgr128-genericGbAf# 18:43:38 executing program 0: fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000001c0)) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) connect$nfc_llcp(0xffffffffffffffff, &(0x7f00000002c0)={0x27, 0x1, 0x0, 0x4, 0xe8, 0xb3, "b4c54d85154477c79497d0002bdbbc98897803c1efb0c12d19799364826d9c329c0f7515f59d85f5b0b9a5ad6edfbbe904124aa180474870b906e901d76be5", 0x38}, 0x60) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) dup3(0xffffffffffffffff, r0, 0x100000) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/45, 0x2d) truncate(&(0x7f0000000140)='./bus/file0\x00', 0x0) [ 2683.047037][ T3827] could not allocate digest TFM handle tgr128-genericGbAf# 18:43:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericvh\xbf\x81\x89wl#\x00'}}) [ 2683.388608][ T3829] could not allocate digest TFM handle tgr128-generic`B 18:43:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe68557518fa2116d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:39 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2aa00180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic;\x1d\xd9\xa5\xf9\x0f\x9a\x1c\x00'}}) 18:43:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x0e\v\x00'}}) [ 2683.731049][ T3949] could not allocate digest TFM handle tgr128-genericvhwl# [ 2683.822159][ T4111] could not allocate digest TFM handle tgr128-genericvhwl# 18:43:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xbcTB\xd2\x7f\xdd\x7f#\x00'}}) 18:43:39 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfffffe3e) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x40, 0x0, "4177789c681c9b22fc15b7c62ff4831bffec197b01d21fd463c34543ec4bc88a6a65a321313106aa55ffb20ca0cb01dae109bf722879742003ef4eb46fe030dec676e9c716fb859efd0075f51240044d"}, 0xd8) 18:43:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6882f2bb4b16896, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2684.194216][ T4073] could not allocate digest TFM handle tgr128-generic;٥ 18:43:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericdx^\x04{O\xa7\x1c\x00'}}) 18:43:40 executing program 0: setresuid(0x0, 0xee01, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x4) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.threads\x00', 0x2, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ashmem\x00', 0x80100, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff}) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0xc0}}, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/dsp\x00', 0x40, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r11 = gettid() capget(&(0x7f0000000000)={0x19980330, r11}, &(0x7f0000000180)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r12, &(0x7f0000000100)=ANY=[], 0xfffffe3e) getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, &(0x7f0000000d80)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f0000000e80)=0xe8) r14 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r16, 0x0) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) dup3(r18, r17, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000340)=0xfffffffffffffeed) setresuid(0x0, r19, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r20, 0x10f, 0x87, 0x0, 0x0) fstat(r20, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r22) fstat(r22, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) fsetxattr$system_posix_acl(r14, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="020000000100e9da0000000002000400", @ANYRES32=r16, @ANYBLOB="02000700", @ANYRES32=r19, @ANYBLOB="02000500", @ANYRES32=r21, @ANYBLOB="02000700", @ANYRES32=r23, @ANYBLOB="040004000000000008000a00", @ANYRES32=r24, @ANYBLOB="10000300000000002000040000000000"], 0x4c, 0x2) r25 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) r26 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r27, 0x0) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) r29 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) dup3(r29, r28, 0x0) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000340)=0xfffffffffffffeed) setresuid(0x0, r30, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r31, 0x10f, 0x87, 0x0, 0x0) fstat(r31, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r33) fstat(r33, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) fsetxattr$system_posix_acl(r25, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="020000000100e9da0000000002000400", @ANYRES32=r27, @ANYBLOB="02000700", @ANYRES32=r30, @ANYBLOB="02000500", @ANYRES32=r32, @ANYBLOB="02000700", @ANYRES32=r34, @ANYBLOB="040004000000000008000a00", @ANYRES32=r35, @ANYBLOB="10000300000000002000040000000000"], 0x4c, 0x2) getgroups(0x3, &(0x7f0000000ec0)=[0x0, r24, r35]) r37 = io_uring_setup(0x41a, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x2, 0xdb}) r38 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) r39 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r39, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r40 = syz_open_dev$usbmon(&(0x7f0000000f80)='/dev/usbmon#\x00', 0x6, 0x8801) r41 = fspick(0xffffffffffffff9c, &(0x7f0000000fc0)='./file0\x00', 0x0) r42 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001040)={&(0x7f0000001000)='./file0\x00', 0x0, 0x4}, 0x10) r43 = gettid() capget(&(0x7f0000000000)={0x19980330, r43}, &(0x7f0000000180)) r44 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r45) newfstatat(0xffffffffffffff9c, &(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r47 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r48 = syz_open_dev$video(&(0x7f0000001140)='/dev/video#\x00', 0x200, 0x40000) r49 = open(&(0x7f0000001180)='./file0\x00', 0x84000, 0x100) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r51 = socket$alg(0x26, 0x5, 0x0) bind$alg(r51, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r52 = accept4(r51, 0x0, 0x0, 0x0) splice(r50, 0x0, r52, 0x0, 0x20000000003, 0x0) r53 = accept4$x25(r50, &(0x7f00000011c0), &(0x7f0000001200)=0x12, 0x0) r54 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r54, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r55 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r55, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020d000018000000000000000000000004000300000000000000000000000000e0ffffff000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000005000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xc0}}, 0x0) r56 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r56, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000900)=ANY=[@ANYBLOB="020d00001800000000000000000000000400030000000000000000000000000000000000000000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000005000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000a8b6b97bfca0645cfc4c0eb3f18a8849650902f75ebfb395a84a54ace9ca423d635594d23f4a8e7dcce79f189b6b7bbcdf8c"], 0xc0}}, 0x0) r57 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r58 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r58, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={0x0}, &(0x7f00000012c0)=0xc) r60 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r61) newfstatat(0xffffffffffffff9c, &(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) sendmsg$unix(r0, &(0x7f0000001500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f00000000c0)="6354c6ee39eea06ac104746a71a4f4f9f1313cf883a57b21dc4865818550b58e5321e9eca51587fb7459669c00b978c3386798a0667ca6a75162f0b9ebe962ae859a877d22711ea6af8e1bb5dc19449fa47d99cc07ae58365858c7872b594ce15cf3cb89c83b73a005c7f0f1c6df3c1e2631b58398130c140392af019ead41b20415d3a659bec6b0e21188bf4c5cf6ce72798f", 0x93}, {&(0x7f0000000180)}, {&(0x7f00000001c0)="a6df9925bfc9cb697bbc922f0179b28b871520e62e4638ef", 0x18}, {&(0x7f0000000200)="f50305a41c9a1e4d11e7be59575710d0368200ae475378006ae789df39a7916ded12c1e1ac6dc5d271f67bfe0a747b7079839adddbbb732529c96ebba33d56d3f2213e72693ef21ce7db1bbb04a0834c0916df7bb6d9da1be235b7b4434a937982b78255aeb2af989284fba5aa40b2c1d0c7166d26b6c2f672d71a44b2cabcd89be04e9eb2273e2e92a8daf526678b3103ed196ae6d243d90233d52883994869755518c0642b4a", 0xa7}, {&(0x7f00000002c0)="615ee856550ade948ad5e59e832a8a1f35d8d6d1db2e4c1f8668ebcf4739e32f3737f29fb091dd1a973a8733e7", 0x2d}, {&(0x7f0000000300)="0e8387afe06e279f494f87a55570f11f8d93df3a8605b0f21a0f1161bb2f0e7ead2f631d2e763bd82695e7d1a989a924e720901e8da5642e2338fb872e3580c46ae9db114224d73a071d91deb5cc052ab07194fff51682318a8875433ec5fd4db2138883773c602945c7f6554ed7a79665a157b2b26bc890a7342322e49f8ac69704bf16ea24cc515f4f34bcc2dcf24e1a9c10d22a5b93799c36f59854972dd1dc27d8c368489ff9a72a4b64a7", 0xad}, {&(0x7f00000003c0)="856bdcb2229d9cc03782c9a34200544b047f0cfd5ffd7379ca6b06aab5197978c6397d4987815716bfdac5d896bc77a5275390254ed8b05ab6671d4a1f097b40ad89fac0bd8144d31bfbc1526b47f35bf2709e8a3f170d84c2e89c77edd2bcae5b931e0f2d03e04645f9dda25a328936bf321178078eb309297367d8e8e7885a5f09222ea6f7b1af792b5dd7c26f68e5420d5146a226b9714226caaa88cce2c1776ffeaeb79ce29debe92f199d", 0xad}, {&(0x7f0000000480)="f822eb24318180eb3ca22f55dd6385c6191c8e4416a63ddadbd14e0c753406edce54bb3f59a86fcd35c3ce4170f5874820ee5bd0e721a6cdffa7a2adbd2dc37c2e5444a13f186e545a49a4ba6ac58ea8cfe79c5334e2cc3ad683e6be89d03d7f6929a8338614bfdb32a0c1bbbf29dc700608208f49691452f58145e1c6984f312d098411c30a39d96b6d8d74702840734ad29342e61f9fc6c8dd1ddf4091e195856054b69959629272cd22ff81fdf0cd5119d729bc430527efa8badf51ef0591d7df2c6678a358f906aa2528750b60ea94a8886683e5223ede0e11eb037306be3336dbfe5df316381765fba411a59fa01c35ad02d7804150abc95a", 0xfb}, {&(0x7f0000000580)="7af045fe1fdf1ddf3c2cec728f84898f20b68fd85d722ae2749afb4d03ea84ebe132f57d39bdba517f6470c3a2f8961e58ed0e5f7349e5bed69206314bfd77f0baf232fb009ef4be5baeea91855779c25773edc35339b8c149f8ddd08ce280681340bc576a148f950b1101cdd834963166a220c0db5b9f4ea5661056c2a55b4af07375c61f0bb315ba74a22a3e08bdb8e66acd3ddcaf6c5783d5106106e10b9ef91d9b2295fc8a861847f11341c454513f670062137654361999143c706400d649f44c5e16372730bcd092f6536ff9cb68ccca54", 0xd4}, {&(0x7f0000000680)="d0b917d3cb82bbe5edb0873d25cdd73f3440d9a5fc5931f57eb3b3482df69880a1c73133d9b766ec04019110bbbfed1ae5040439474147843882d684630e4de2fe258225ca15e9b713c5e0e8a0506400ddeb9e0e6326ecd20d46413c18abdfb46c01f990cd9b6468ff049bfb60a5166f9e3019b8d1dbd3ca59b1326131aab83bd65b469819aa2258a2be5095d9e885ba39ad859b0d256a45052e2c5d4b9c80bbcd6fe7e250d94e699c1f35f7dbff35030e1cda2ade97329be2921162d096062c5ae2ba1b44d7fc35813415be11df1bc7daabdd1eb41c71a79a46c9043776cade56c0efcbd7d1ca", 0xe7}], 0xa, &(0x7f00000013c0)=[@rights={{0x38, 0x1, 0x1, [r1, r2, r3, r4, r5, r6, r7, r8, r9, r10]}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r36}}}, @rights={{0x2c, 0x1, 0x1, [r37, r38, 0xffffffffffffffff, r39, r40, r41, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r42]}}, @cred={{0x1c, 0x1, 0x2, {r43, r45, r46}}}, @rights={{0x14, 0x1, 0x1, [r47]}}, @rights={{0x38, 0x1, 0x1, [r48, r49, r53, r54, r55, 0xffffffffffffffff, 0xffffffffffffffff, r56, r57, r58]}}, @cred={{0x1c, 0x1, 0x2, {r59, r61, r62}}}], 0x130, 0x890}, 0x4004805) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) 18:43:40 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0xda12b0992da69c3c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2684.414006][ T4143] could not allocate digest TFM handle tgr128-generic [ 2684.482048][ T4200] could not allocate digest TFM handle tgr128-genericTB# [ 2684.498817][ T4197] could not allocate digest TFM handle tgr128-generic [ 2684.619015][ T4348] could not allocate digest TFM handle tgr128-genericTB# 18:43:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\f\x00'}}) 18:43:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generick02\b\x14\xf2\x96#\x00'}}) 18:43:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe689cce50e82c2ba, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x17, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x57}}, &(0x7f0000000140)='Q7\\$', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x68b840, 0x0) ioctl$KDENABIO(r1, 0x4b36) 18:43:40 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r0, 0xc2604111, &(0x7f0000000280)={0x40, [[0x85c5, 0x2, 0x1, 0x1, 0x573, 0xf12e, 0x0, 0x7], [0x8000, 0x10000, 0x7, 0x7, 0x3, 0x3, 0x3, 0x80000001], [0x8, 0xd651, 0xffffffff, 0x8001, 0xde7, 0x2, 0x3ff, 0x2]], [], [{0x0, 0xf8, 0x0, 0x1, 0x1, 0x1}, {0x7ff, 0xfffffffb, 0x0, 0x0, 0x0, 0x1}, {0xfff, 0x1000, 0x0, 0x1}, {0x940, 0x1, 0x0, 0x1, 0x1, 0x1}, {0xfffffffa, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x81, 0x40, 0x0, 0x1}, {0x7fffffff, 0xc6}, {0x8001, 0x9}, {0xd8, 0x859, 0x0, 0x1, 0x1, 0x1}, {0x1ff00000, 0x1, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x7f, 0x0, 0x0, 0x0, 0x1}, {0x1f, 0x5, 0x1, 0x0, 0x1}], [], 0x9}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(cbc(serpent),xxhash64)\x00'}, 0x58) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r8 = gettid() capget(&(0x7f0000000000)={0x19980330, r8}, &(0x7f0000000180)) r9 = syz_open_procfs(r8, &(0x7f0000000140)='gid_map\x00') r10 = gettid() capget(&(0x7f0000000000)={0x19980330, r10}, &(0x7f0000000180)) write$cgroup_pid(r9, &(0x7f0000000180)=r10, 0x12) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={r7, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r7, 0x5b3}, 0xc) r11 = accept4(r2, 0x0, 0x0, 0x0) splice(r1, 0x0, r11, 0x0, 0x20000000003, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000000)=0x6) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000040)) [ 2685.081753][ T4329] could not allocate digest TFM handle tgr128-genericdx^{O 18:43:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6a4ec8b69e4d8e4, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2685.191021][ T4544] could not allocate digest TFM handle tgr128-generick02# 18:43:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x10\xc0\x92\xc6E\xcd\x1c\x00'}}) 18:43:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xe6\f\x00'}}) [ 2685.265889][ T4618] could not allocate digest TFM handle tgr128-generick02# 18:43:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000440)=0x0) io_destroy(r0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfffffe3e) accept$unix(r1, &(0x7f0000000140), &(0x7f0000000080)=0x6e) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x30d}, 0x9c) io_submit(0x0, 0x0, &(0x7f0000000080)) 18:43:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\'^\xd7\xbc\x8c\x8b\xac#\x00'}}) 18:43:41 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x20000000003, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000000)=0x3ff, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xe6\xfc\x9e\x9d\xed\x1f\xe6\x1c\x00'}}) 18:43:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6b1845d3567f080, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:41 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000cc0)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x10001) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x7, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x30, r3, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'\xb5=\x93\xa8\x82\xdd\xf2\xa8;'}}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x34, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x18, 0x80, @udp='udp:syz1\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x28082}, 0x4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x24c, [0x0, 0x20000240, 0x20000270, 0x20000654], 0x0, &(0x7f0000000000), &(0x7f0000000240)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x0, 0x8, 0x0, 'veth1\x00', 'ip6erspan0\x00', 'veth1\x00', 'eql\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x1fe, 0x17e], @empty, [0x0, 0x0, 0xff], 0x6e, 0x9e, 0xd6, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x3, 0x86, 0xc543, 'team_slave_1\x00', 'veth1_to_hsr\x00', 'nr0\x00', 'vxcan1\x00', @random="111bcfd8193f", [], @dev={[], 0x19}, [], 0x9e, 0x9e, 0xe6, [@cgroup0={{'\x00', 0x0, 0x8}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x2c4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000600)=[{&(0x7f0000000140)="b6b4aaf1e2ad814c9093a4a320887d8a9779c894380879ff", 0x18, 0x8}, {&(0x7f00000004c0)="9d681ac820eeacc652ce0ec737b9700eee875fb2fca35834590363c1be8c76fa64a73309db815fee7be2d1cf345955d3c31fcef6c4cf159d8a2425ebbdadf64f3cc00d4361691aec8ed494b6f9a01b2bf96650615232ccd72d48383f9b7dc7e7629bcb5e8bed60628b871849296d93be12e8b43844356ef64711a8fdf75f2b8ebe4050d600a807dbc39043b5019d", 0x8e, 0x1000}, {&(0x7f0000000580)="dbf64760effc4b9e0e02c59822291f21c441032e2a4fdd8609e77a67bc179160cd4141e5d5ff93dd5240ce60b5ee507310b61b8130c8949a421ddfd5f6073448d556", 0x42}], 0x1056800, &(0x7f0000000680)={[{@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0x2}}, {@dmask={'dmask', 0x3d, 0x8}}, {@nls={'nls', 0x3d, 'cp932'}}]}) [ 2685.818481][ T4672] could not allocate digest TFM handle tgr128-generic [ 2685.894606][ T4747] could not allocate digest TFM handle tgr128-generic'^׼# [ 2685.950308][ T4727] could not allocate digest TFM handle tgr128-generic [ 2685.974166][ T4897] could not allocate digest TFM handle tgr128-generic'^׼# 18:43:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x97O\xc9j\x8fE\xad#\x00'}}) 18:43:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\r\x00'}}) [ 2686.248532][ T4894] could not allocate digest TFM handle tgr128-generic 18:43:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6c5343d6ca0f85d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericm\x926\t&\xe2\xec\x1c\x00'}}) 18:43:42 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r5 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r5}, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x10, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r9, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYRES64=r7], @ANYRES32, @ANYRES32, @ANYBLOB="46b93ee6a8ccac064b00005fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7b17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f6112009fc329fb3320565c9ff9233a4141000be97342fec8603b9ebc4cf0923c88334501831ff741891ff83bd815f03282cb8c7668a000d81d2fa23cc7b956942c2650306152e4700"/169, @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESHEX=r2], 0x7, 0x1) r10 = socket(0xa, 0x3, 0x8) r11 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r13 = gettid() waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x1000000, &(0x7f0000000480)) sendmsg$key(r10, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r12, @ANYRESDEC=r13]], 0xfffffffffffffe56}}, 0x20004850) r14 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r15 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r16 = dup2(r15, r14) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r16, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r17 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r17) r18 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r18, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r18, 0x227d, &(0x7f0000000780)) kcmp(r17, r13, 0x0, 0xffffffffffffffff, r18) ptrace$setopts(0x4206, r17, 0x0, 0x0) r19 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0)=0x5, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r17, r19, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r5, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r21, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r20}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)='vboxnet1[&[]\x00', r20}, 0x30) move_pages(r22, 0x5, &(0x7f0000000080)=[&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil], &(0x7f00000000c0)=[0x17d4, 0x77a2, 0x4, 0x5], &(0x7f0000000100)=[0x0, 0x0], 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:42 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000cc0)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x10001) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x7, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x30, r3, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'\xb5=\x93\xa8\x82\xdd\xf2\xa8;'}}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x34, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x18, 0x80, @udp='udp:syz1\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x28082}, 0x4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x24c, [0x0, 0x20000240, 0x20000270, 0x20000654], 0x0, &(0x7f0000000000), &(0x7f0000000240)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x0, 0x8, 0x0, 'veth1\x00', 'ip6erspan0\x00', 'veth1\x00', 'eql\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x1fe, 0x17e], @empty, [0x0, 0x0, 0xff], 0x6e, 0x9e, 0xd6, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x3, 0x86, 0xc543, 'team_slave_1\x00', 'veth1_to_hsr\x00', 'nr0\x00', 'vxcan1\x00', @random="111bcfd8193f", [], @dev={[], 0x19}, [], 0x9e, 0x9e, 0xe6, [@cgroup0={{'\x00', 0x0, 0x8}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x2c4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000600)=[{&(0x7f0000000140)="b6b4aaf1e2ad814c9093a4a320887d8a9779c894380879ff", 0x18, 0x8}, {&(0x7f00000004c0)="9d681ac820eeacc652ce0ec737b9700eee875fb2fca35834590363c1be8c76fa64a73309db815fee7be2d1cf345955d3c31fcef6c4cf159d8a2425ebbdadf64f3cc00d4361691aec8ed494b6f9a01b2bf96650615232ccd72d48383f9b7dc7e7629bcb5e8bed60628b871849296d93be12e8b43844356ef64711a8fdf75f2b8ebe4050d600a807dbc39043b5019d", 0x8e, 0x1000}, {&(0x7f0000000580)="dbf64760effc4b9e0e02c59822291f21c441032e2a4fdd8609e77a67bc179160cd4141e5d5ff93dd5240ce60b5ee507310b61b8130c8949a421ddfd5f6073448d556", 0x42}], 0x1056800, &(0x7f0000000680)={[{@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0x2}}, {@dmask={'dmask', 0x3d, 0x8}}, {@nls={'nls', 0x3d, 'cp932'}}]}) [ 2686.733601][ T5020] could not allocate digest TFM handle tgr128-genericOjE# 18:43:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x0e\x00'}}) [ 2686.844597][ T5145] could not allocate digest TFM handle tgr128-genericOjE# [ 2686.887695][ C1] net_ratelimit: 16 callbacks suppressed [ 2686.887705][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.887713][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.887772][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.893753][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:43:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6faa8276b0785c2, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericL\xa6\xef\t\xe9\a\xae#\x00'}}) [ 2687.038004][ T5138] could not allocate digest TFM handle tgr128-genericm6 & 18:43:42 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4800, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f00000000c0)=0x7) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) kcmp(r2, 0x0, 0x5, r0, r3) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x1380c3bcc8fa49a, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r4, 0x80084121, &(0x7f0000000040)) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x91\x17\x95c\xc8\xf7\xf1\x1c\x00'}}) 18:43:43 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000cc0)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x10001) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x7, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x30, r3, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'\xb5=\x93\xa8\x82\xdd\xf2\xa8;'}}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x34, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x18, 0x80, @udp='udp:syz1\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x28082}, 0x4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x24c, [0x0, 0x20000240, 0x20000270, 0x20000654], 0x0, &(0x7f0000000000), &(0x7f0000000240)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x0, 0x8, 0x0, 'veth1\x00', 'ip6erspan0\x00', 'veth1\x00', 'eql\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x1fe, 0x17e], @empty, [0x0, 0x0, 0xff], 0x6e, 0x9e, 0xd6, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x3, 0x86, 0xc543, 'team_slave_1\x00', 'veth1_to_hsr\x00', 'nr0\x00', 'vxcan1\x00', @random="111bcfd8193f", [], @dev={[], 0x19}, [], 0x9e, 0x9e, 0xe6, [@cgroup0={{'\x00', 0x0, 0x8}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x2c4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000600)=[{&(0x7f0000000140)="b6b4aaf1e2ad814c9093a4a320887d8a9779c894380879ff", 0x18, 0x8}, {&(0x7f00000004c0)="9d681ac820eeacc652ce0ec737b9700eee875fb2fca35834590363c1be8c76fa64a73309db815fee7be2d1cf345955d3c31fcef6c4cf159d8a2425ebbdadf64f3cc00d4361691aec8ed494b6f9a01b2bf96650615232ccd72d48383f9b7dc7e7629bcb5e8bed60628b871849296d93be12e8b43844356ef64711a8fdf75f2b8ebe4050d600a807dbc39043b5019d", 0x8e, 0x1000}, {&(0x7f0000000580)="dbf64760effc4b9e0e02c59822291f21c441032e2a4fdd8609e77a67bc179160cd4141e5d5ff93dd5240ce60b5ee507310b61b8130c8949a421ddfd5f6073448d556", 0x42}], 0x1056800, &(0x7f0000000680)={[{@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0x2}}, {@dmask={'dmask', 0x3d, 0x8}}, {@nls={'nls', 0x3d, 'cp932'}}]}) 18:43:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\v\x0e\x00'}}) [ 2687.588805][ T5348] could not allocate digest TFM handle tgr128-genericL # 18:43:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6fc9e9ded1fe61c, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2687.675858][ T5489] could not allocate digest TFM handle tgr128-genericL # 18:43:43 executing program 4: ioprio_set$pid(0x1, 0x0, 0x200007e35) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x401) r0 = gettid() r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000040)={0x19980330, r1}, &(0x7f0000000180)={0x9}) syz_open_procfs(r0, &(0x7f0000000000)='mountstats\x00') clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:43:43 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000cc0)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x10001) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x7, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x30, r3, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'\xb5=\x93\xa8\x82\xdd\xf2\xa8;'}}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x34, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x18, 0x80, @udp='udp:syz1\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x28082}, 0x4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x24c, [0x0, 0x20000240, 0x20000270, 0x20000654], 0x0, &(0x7f0000000000), &(0x7f0000000240)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x0, 0x8, 0x0, 'veth1\x00', 'ip6erspan0\x00', 'veth1\x00', 'eql\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x1fe, 0x17e], @empty, [0x0, 0x0, 0xff], 0x6e, 0x9e, 0xd6, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x3, 0x86, 0xc543, 'team_slave_1\x00', 'veth1_to_hsr\x00', 'nr0\x00', 'vxcan1\x00', @random="111bcfd8193f", [], @dev={[], 0x19}, [], 0x9e, 0x9e, 0xe6, [@cgroup0={{'\x00', 0x0, 0x8}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x2c4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000600)=[{&(0x7f0000000140)="b6b4aaf1e2ad814c9093a4a320887d8a9779c894380879ff", 0x18, 0x8}, {&(0x7f00000004c0)="9d681ac820eeacc652ce0ec737b9700eee875fb2fca35834590363c1be8c76fa64a73309db815fee7be2d1cf345955d3c31fcef6c4cf159d8a2425ebbdadf64f3cc00d4361691aec8ed494b6f9a01b2bf96650615232ccd72d48383f9b7dc7e7629bcb5e8bed60628b871849296d93be12e8b43844356ef64711a8fdf75f2b8ebe4050d600a807dbc39043b5019d", 0x8e, 0x1000}, {&(0x7f0000000580)="dbf64760effc4b9e0e02c59822291f21c441032e2a4fdd8609e77a67bc179160cd4141e5d5ff93dd5240ce60b5ee507310b61b8130c8949a421ddfd5f6073448d556", 0x42}], 0x1056800, &(0x7f0000000680)={[{@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0x2}}, {@dmask={'dmask', 0x3d, 0x8}}, {@nls={'nls', 0x3d, 'cp932'}}]}) 18:43:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\x00\xc0\xa6\xfa\xc4#\x00'}}) [ 2687.783247][ T5375] could not allocate digest TFM handle tgr128-genericc 18:43:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x9a\x14\b\x1f\"\xbc\xfa\x1c\x00'}}) [ 2688.017743][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2688.023749][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe6fd43e1d5a2d069, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:44 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='/dev/rfkill\x00\x8a6\xebgfO\xf9\n\x13Y\x99\xaf\xb9\xcb\xf0\xadD\xf6\x13\xbd]', 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00bf000200038444bc56376b486c8d8d07902ceaa8db57e48f1180afc3b58ce217b422d7b30ae4a13931be0100000000000000744cea"], 0x6) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[], 0x308) sendfile(r0, r1, &(0x7f0000000000), 0x7fffffffffffffff) [ 2688.331583][ T5590] could not allocate digest TFM handle tgr128-generic  [ 2688.407749][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2688.413601][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2688.419703][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2688.425524][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2688.439777][ T5601] could not allocate digest TFM handle tgr128-generic  18:43:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xb6\xd9\x10s\x83J\xc8#\x00'}}) 18:43:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x0f\x00'}}) [ 2688.578945][ T5618] could not allocate digest TFM handle tgr128-generic" 18:43:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000012000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000012000/0x4000)=nil, &(0x7f0000fed000/0x2000)=nil, &(0x7f0000017000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f0000001000/0x3000)=nil, &(0x7f00000001c0)="c6626d54ac5ee23d81fe738c082705f31b3fb8349cea9843ffd1", 0x1a, r1}, 0x68) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000180)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcbe) 18:43:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\xf8\xb2\x91\xc9\x92\x1e\x1d\x00'}}) 18:43:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe713adb13ff27c20, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2688.950539][ T5734] could not allocate digest TFM handle tgr128-genericsJ# [ 2689.026833][ T5820] could not allocate digest TFM handle tgr128-genericsJ# 18:43:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic:;fC\x92\x03\xd1#\x00'}}) 18:43:45 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) prlimit64(r0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x3f, 0x3, 0x0, 0x0, 0x101}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) pipe(0x0) close(0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r3, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='o/k\x8dm\x00\x03\x00', 0x2001, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000007c0)=ANY=[@ANYBLOB="0184b8000000000000000000042000000000000000000000d4ff624289003c3e6504e6528bf42db06d0000000000000000000000000000000100000000f0e51b033ec28b4e018befdb8852bea78e7dff87f6c3f06cbb182219a0e0dc19a35d6a20a08655ba00b391a9e3ddc811e19807fb0fac4939b9b25f749f73e19800"/145]) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x7ff, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) ppoll(&(0x7f0000000780)=[{}, {r4, 0x13}], 0x2, 0x0, 0x0, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) ppoll(&(0x7f0000000780)=[{r5, 0x13}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x0, 0x2) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000c18000), 0x0) accept4(r6, &(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f00000005c0)=0xfe67, 0x2c0f134d13d1f0d1) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) ppoll(&(0x7f0000000780)=[{r7}, {r8}], 0x2, 0x0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ppoll(&(0x7f0000000780)=[{0xffffffffffffffff, 0x13}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES64, @ANYPTR=&(0x7f00000007c0)=ANY=[], @ANYRES64, @ANYRES16=0x0, @ANYRESHEX=r7], 0x43) r9 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8b24, &(0x7f0000000400)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\a\x00\x00 \x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyg-\x97\xa1\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') openat$snapshot(0xffffffffffffff9c, 0x0, 0x20001, 0x0) 18:43:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xbb\x10\x00'}}) 18:43:45 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfffffe3e) r2 = socket(0xa, 0x3, 0x8) r3 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r5 = gettid() waitid(0x83b895581628fca4, r5, &(0x7f0000000040), 0x1000000, &(0x7f0000000580)) sendmsg$key(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r4, @ANYRESDEC=r5]], 0xfffffffffffffe56}}, 0x20004850) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x4140, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r6, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r6, 0xc4c85512, &(0x7f0000000b00)={{0x2, 0x4, 0x80000000, 0x1, 'syz0\x00', 0x2}, 0x0, [0x4, 0x8, 0x280, 0x6, 0x3, 0x3, 0xc80, 0x9, 0x66, 0x6, 0x6, 0x4, 0x6, 0x2000000000, 0xfffffffffffffff8, 0x3, 0x8001, 0x7, 0x4, 0x1, 0xfffffffffffff801, 0x3, 0x0, 0x7fff00000, 0x3, 0x0, 0x8001, 0x1557, 0x3, 0x4, 0x5, 0x1, 0x8, 0x66cd, 0x3, 0x8001, 0xfffffffffffffe01, 0x3, 0xc90, 0xffffffffffffffff, 0x5, 0x7, 0x80, 0x3, 0x4, 0x0, 0x9, 0xffff, 0x14000000, 0x80000001, 0x400, 0xfffffffffffffffb, 0x0, 0x80000000, 0x4, 0x1, 0x8000, 0x7fffffff, 0x10000, 0xffffffffffffff01, 0xb5d, 0x224b17fc, 0x8, 0x0, 0x81f2, 0x5, 0x7fffffff, 0x1, 0x8, 0x10000, 0x4, 0x0, 0x7, 0x7f, 0x100, 0x81, 0x1, 0x5, 0x10001, 0x5e, 0x4, 0x0, 0x2, 0x2, 0xd9ec, 0x400, 0x3, 0xffffffff, 0x0, 0x100000001, 0x3, 0x9, 0x15, 0x7, 0x0, 0x9, 0x7, 0xfffffffffffffff8, 0xffffffff, 0x1137, 0x7, 0x6, 0x3ff, 0x4a1, 0x6, 0x7, 0x0, 0x1e05, 0x8, 0x200, 0x1, 0x7, 0x1, 0x4, 0x5, 0x5, 0x8, 0x8d87, 0x4, 0x1f, 0x33c, 0x75dd, 0xfffffffffffffffa, 0x1f, 0x9, 0x9, 0xc749]}) r7 = socket$key(0xf, 0x3, 0x2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000001c0)=0x2) sendmsg$key(r7, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0xf000000, 0x7, 0x7, r7, 0x0, &(0x7f0000000100)={0x980909, 0x8, [], @p_u16=&(0x7f0000000040)=0x1}}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r4, r8}}, 0x18) ioctl$UI_END_FF_ERASE(r0, 0x40045566, &(0x7f0000000080)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r9, &(0x7f0000000100)=ANY=[], 0xfffffe3e) ioctl$KVM_GET_LAPIC(r9, 0x8400ae8e, &(0x7f0000000700)={"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"}) set_tid_address(&(0x7f0000000200)) 18:43:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe7535130671f7b4c, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericU\'\x0e\xce\xc1\x8f+\x1d\x00'}}) [ 2689.740608][ T5969] could not allocate digest TFM handle tgr128-generic:;fC# [ 2689.870136][ T6082] could not allocate digest TFM handle tgr128-generic:;fC# 18:43:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x1c}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) getsockopt$packet_buf(r3, 0x107, 0xdd1d450e4781a748, &(0x7f00000000c0), &(0x7f0000000200)) ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cc], 0x100000}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x14) ioctl$KVM_RUN(r6, 0xae80, 0x0) 18:43:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe7ce8655f29c1139, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xbe\\]\x04\x91\b\xd3#\x00'}}) [ 2690.076012][ T6027] could not allocate digest TFM handle tgr128-genericU'+ [ 2690.147317][ T5977] could not allocate digest TFM handle tgr128-generic [ 2690.267893][ T6074] could not allocate digest TFM handle tgr128-generic 18:43:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-genericC\xbb\x03G\xaf{-\x1d\x00'}}) 18:43:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x11\x00'}}) 18:43:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000507d25a80648c63940d0124fc60100008400a000000053582c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x20000000003, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x17, 0x0, 0x20, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x200000cd, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) fstat(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) dup3(r10, r9, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000340)=0xfffffffffffffeed) setresuid(0x0, r11, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r12, 0x10f, 0x87, 0x0, 0x0) fstat(r12, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r14) fstat(r14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) fsetxattr$system_posix_acl(r6, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="020000000100e9da0000000002000400", @ANYRES32=r8, @ANYBLOB="02000700", @ANYRES32=r11, @ANYBLOB="02000500", @ANYRES32=r13, @ANYBLOB="02000700", @ANYRES32=r15, @ANYBLOB="040004000000000008000a00", @ANYRES32=r16, @ANYBLOB="10000300000000002000040000000000"], 0x4c, 0x2) r17 = getuid() r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r19) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x200000, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r16}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@permit_directio='permit_directio'}, {@smackfsroot={'smackfsroot', 0x3d, '*(eth0)security'}}, {@fowner_lt={'fowner<', r17}}, {@subj_role={'subj_role', 0x3d, ',vmnet0^'}}, {@audit='audit'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r19}}]}}) [ 2690.539448][ T6324] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 2690.544205][ T6211] could not allocate digest TFM handle tgr128-generic\]# 18:43:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8971, &(0x7f00000002c0)={'b\a\x00\x00\x00\x00\x00\x00\x00 \x00\x00\xe2\xff\xbf\xff', @ifru_map={0x2, 0x101, 0xffff, 0x5, 0x0, 0xf7}}) pipe(&(0x7f0000000240)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0xfffffffffffffd94) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00'/12], 0xc) fstatfs(0xffffffffffffffff, &(0x7f0000001340)=""/225) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r6 = fanotify_init(0x200, 0x0) fanotify_mark(r6, 0x1, 0x4800003e, r5, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) ioctl(r6, 0x6, &(0x7f0000000340)="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") fsetxattr$trusted_overlay_opaque(r4, &(0x7f0000000000)='trusted.overlay.o\xf0aque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) socket$inet(0x2, 0x0, 0x0) [ 2690.606552][ T6211] could not allocate digest TFM handle tgr128-generic\]# 18:43:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe7fd843f618a3849, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 18:43:46 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4000, 0x0) sendto$netrom(r0, &(0x7f0000000040)="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", 0xfd, 0x10, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/ocfs2_control\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f0000001800)={0xa, 0x4e20, 0x5, @mcast2, 0x7fff}, 0x1c) connect$inet6(r0, &(0x7f0000001840)={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x2a}, 0x80000000}, 0x1c) r2 = fanotify_init(0x0, 0x1c1000) lseek(r2, 0x1, 0x1) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001880)='/dev/dlm-control\x00', 0x501080, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f00000018c0)=0xffff8001, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f0000001940)) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000001a40)={0xf64ffff, 0x4, 0xffff, r4, 0x0, &(0x7f0000001a00)={0x980abe, 0xffffffff, [], @string=&(0x7f00000019c0)=0x7}}) setsockopt$bt_BT_POWER(r5, 0x112, 0x9, &(0x7f0000001a80)=0x7, 0x1) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000001ac0)={0x6, [[0x2, 0xfffffff9, 0x4, 0x1, 0xef, 0x7, 0x7, 0xc55], [0x1000, 0xe17, 0x9, 0x9, 0x3, 0x1, 0x8, 0x3ff], [0x9, 0x41, 0x2, 0x8, 0x6, 0x1, 0xffffffff, 0x7]], [], [{0x0, 0x7fffffff, 0x1, 0x0, 0x0, 0x1}, {0xf42e, 0x8e6, 0x1, 0x0, 0x1, 0x1}, {0x3, 0x3, 0x1, 0x1, 0x1}, {0xa9, 0x8, 0x0, 0x1}, {0x9, 0x81, 0x1, 0x1, 0x0, 0x1}, {0xb02, 0x5}, {0x8, 0x68df, 0x0, 0x0, 0x0, 0x1}, {0xfffffff7, 0xfffffffd, 0x0, 0x1, 0x1}, {0x5, 0xda2, 0x1, 0x1, 0x1}, {0x10000, 0x4, 0x0, 0x0, 0x0, 0x1}, {0xfffffff7, 0xdb, 0x1, 0x1}, {0x7, 0xffffffff, 0x0, 0x0, 0x0, 0x1}], [], 0x3}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/ttyS3\x00', 0x80000, 0x0) ioctl$TIOCMIWAIT(r6, 0x545c, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001dc0)={&(0x7f0000001d80)='\x00', r3}, 0x10) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r7) r8 = syz_open_dev$sndseq(&(0x7f0000001e40)='/dev/snd/seq\x00', 0x0, 0x200000) splice(0xffffffffffffffff, &(0x7f0000001e00)=0xb90, r8, &(0x7f0000001e80)=0x6, 0x1, 0x3) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000001ec0)="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") setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000001fc0)=0x2, 0x4) r9 = syz_open_dev$mouse(&(0x7f0000002000)='/dev/input/mouse#\x00', 0x3, 0x400900) setsockopt$SO_J1939_PROMISC(r9, 0x6b, 0x2, &(0x7f0000002040)=0x1, 0x4) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002080)='net/udplite\x00') ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r10, 0x81785501, &(0x7f00000020c0)=""/4096) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000030c0)='/dev/ubi_ctrl\x00', 0xd4ecde99c8205f08, 0x0) ioctl$KDMKTONE(r11, 0x4b30, 0x200) syz_open_dev$vivid(&(0x7f0000003100)='/dev/video#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000003240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000003200)={0xffffffffffffffff}, 0x219, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000003280)={0xb, 0x10, 0xfa00, {&(0x7f0000003140), r12}}, 0x18) 18:43:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x14=e\x04\x91\b\xd3#\x00'}}) [ 2691.037342][ T6325] could not allocate digest TFM handle tgr128-genericCG{- 18:43:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic2\xff0Ag\xfb:\x1d\x00'}}) 18:43:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, &(0x7f00000000c0)=0xfa) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xa7.\x00'}}) 18:43:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe8095cd093df1ad9, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2691.753167][ T6449] could not allocate digest TFM handle tgr128-generic=e# 18:43:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='nns=iso8\x0059-1,\x00']) r0 = gettid() r1 = gettid() capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000180)) capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000180)={0x80000001, 0x1, 0x0, 0xffffffff, 0x0, 0x8}) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x2, 0xdca9433388955f88) getpriority(0x2, r0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) mount$overlay(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='overlay\x00', 0x40, &(0x7f0000000400)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@xino_on='xino=on'}, {@metacopy_on='metacopy=on'}], [{@subj_role={'subj_role', 0x3d, '@'}}, {@smackfsroot={'smackfsroot', 0x3d, 'cpuset-em1userselfuser*nodev{'}}]}) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x20000000003, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r6, &(0x7f0000000100)=ANY=[], 0xfffffe3e) getsockname$inet6(r5, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c) ioctl$KVM_X86_SET_MCE(r6, 0x4040ae9e, &(0x7f0000000200)={0x6120638ad1481f00, 0x204000, 0x5, 0x0, 0x13}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000100)={0x1, [0xff]}) [ 2691.909449][ T6561] could not allocate digest TFM handle tgr128-generic=e# [ 2692.167730][ C0] net_ratelimit: 14 callbacks suppressed [ 2692.167740][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.179419][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r6, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\xf9\xe3\x9ev\xf3\xea\v$\x00'}}) [ 2692.485413][ T6559] could not allocate digest TFM handle tgr128-generic20Ag: 18:43:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b017835", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={0x0, 0xf3, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa422"}, &(0x7f00000000c0)=0xfb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x5, 0x40, 0x400, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r8, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0xe8118d0785bceb80, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 2692.763462][ T6575] could not allocate digest TFM handle tgr128-generic. 18:43:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce00", 0x81, 0xfffffffffffffffe) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xaa, 0x284980) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000c0c03c34644b0178", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)={r6, 0xf2, "936d9fa6b9340f47db2077220673935e9f678830b968a7a9615e15eeb7cefabbadcdf1cbf147ec499faa92cf8102b6529595ed7e305221917bd2a0703a35c88d2e23a90660fa92484753e908caee8741fd09016685508e439eac5df620b0147c7fb5107c6642208677ee40b949ce42d0751975b7e54c45cbc825e7f999157baa1e8132e2be270ab19c9393ad61f4e87606565a402aaa0baae7c75f13d9aa7c03c999482a82fe132af32d11a95de829a0d8f8d9267f8019522852c1f4c7fe3d794e53e06cacd055b5b8ad0542814d5725dd33a4a424386881be979f24b0c363ae639e87e4061c11dc9a4b82f085122c915aa4"}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x7c7, 0x80}, &(0x7f0000000300)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00PM\xe4\xd6\x87>\x1d\x00'}}) [ 2692.827944][ T6562] could not allocate digest TFM handle tgr128-generic. 18:43:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00\xb2\x87\v\x895P\xb6\xb2\xdd\xe1d\xbcp) }\x0e\x9f\x8d\xa9\xc2\x12\xf1\x0e\xc4\xef\x14\f\aA\xf61}\xbb\xd7\x05e\xb9\x81N \xb0\x84t42V|\x0fP\xd1Y>8\xfd9\n\x03U\xbc@K\xdf*\xfc:\ab|\x9d\xfb\xd5iR\n\x19\xd3n', 0x52) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x0, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) sendmsg$inet6(r1, &(0x7f0000000740)={&(0x7f0000000040)={0xa, 0x4e24, 0x1, @loopback, 0x8df}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000100)="41237134d140cf61adef59f29419419c76bdf805d67f0e11a62beaa9011f7fab18b13f21bb1cc2ba818cddb2", 0x2c}, {&(0x7f0000000180)="cac0e313f2d3a4abc40f613eed824e0e8e0fae2db2cedfc5b29628f25d4892ad6d678efafafc4bdda6cd05e7281f247109f5a9021dd013242fa71dd5cda9e4ee1e6b6a45ec69784e456fc775f62079a3ac34d4a9efc90f89422456fb37e558c8edb72340b060411efb5e1b086a9614057bf1ca304022defd073d1da1886b46ea9ccadb66d6219f9d57d95066ab2ac0f22896f3f9a83669f9cc6246aecd82fd9bc1cf802aff55c61270d56cf458f99447f36b4e0c347bdcdca7914d31b44e6e89a93da784681eb9b546bc3cda13f99e5d8ac598cde4fea1d05bbde890492a3edf23fcb8852578deceb3a937bf", 0xec}, {&(0x7f0000000280)="756ef96b6497404b708e66ab11658c16902c3645aacd01535336f3bbb6655eb4d5b07fff13446d49245137beeb4e0f3913829d8da4da1f8b2cd61aeb6604b4056f572d705d1d74586fe39014fd5a6122d4b430b4a9706534cc66bb359754dcac37910dafa6952101a074d374006081bcfcc2122d5aca66c47e829869833c700dc526dd8e5630ad54447578fc192557c6c3e6a75a1fdbba4d17f4753c8e3393a285ede2e3d4e4ed3e022b3702b78773cfdec10ae53609a9bda506220bdb7a7ca6ea32b4b5d7eae021d48ae77db89932a39cf93b2bfc", 0xd5}, {&(0x7f0000000380)="3c305b8b59c8ed8947dde0c428bd579f55b7046ede7a0a4ab1cb0c1d2da3a8098175264f11c8bd8c391077cfce4eab399813bbd8b6ceed853dec0e889b50760d4b7b78a392361aef246de1700c1733fdc1e0a3c54c26a8818fdc4d69e304823967d547b326db1fae6554a60fc1761beeedd9c573defa1df5a2e6152575339c8269150e7bbdff79e0cded656fd6658c27ef4df398e76fbbc977f77521a17a3acdc5afd6126282ae904a0b713fdf28a92b7615ab8bc6cbcf1d7a2cb4d789537c8afb117a5f24384ac9d0b890a977f0efdf7cbe124a0a371881c0f15727cf3e5c3b8471f3acf9d700177b1396b4d4001933ffca5c1e43c0d2", 0xf7}, {&(0x7f0000000480)="55f565372bff1c33a5f0e74eae381f8ec36b6c1fac92ff7a4dfc13c50fd72611b9479a4a5df4f62f076a19093afd7248be05c5640da1d6e4bcd51d93c6584d0891a2cf2415bea96d7fb030af633579a83a1abd162d53b5dcc9a958e1a5a399621465d92ad1e8437d1d7ed945c4060c55741b4ee2a6539524bed7fc501afed1620d2c343955e9a2971185f401d092649b5179bdb67f0d11d0c11fe04a15090d0433", 0xa1}, {&(0x7f0000000540)="b8e05ee208aafe45239179f7f788660ec35e1ffd6ec16071bcc113e899161affb3d6029101118f7bd13e75a89c11f5fdabeb6e8b2678ba855b1f7d006d391add25bb4638f4aa9fe6e44f13cea0febdf13ffdb057e5f30d7b94fcda8e40f07e3ac498b59833e05ab3cd986b712fac25128c6f74952fbf163e15711fc6e8e347276dc48775b7db30a66794c408f48d2b87885f202e31bff28dd919be7d2df50f6f21b2a7f8ef974f993ab08b01be688cb046ea4991ea384a6353002eb4d437e8530e6a8311672371466aec817a263d2330ca26a048ebfcf8", 0xd7}, {&(0x7f0000000640)="d11873a2bff6ec27c9bc74d0a0badc540f4932db7be073edfd5e6fc754e2870e7e7224ecca33c4ca8989745456fa393a77ef753f2770d47ac001a854d0a6c7b36dc760da8de9482a3366b1949d7f202216baf75b8c35eea1b0c804df0cac7073258acd1245918015017c06e3773366280ce270439ea6", 0x76}], 0x7}, 0x4014) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x0, 0x401}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) [ 2693.127726][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2693.133663][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2693.231399][ T6662] could not allocate digest TFM handle tgr128-genericv $ [ 2693.415759][ T6713] could not allocate digest TFM handle tgr128-genericv $ [ 2694.247761][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2694.253661][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2695.207753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.213671][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2696.327952][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2696.333817][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.290735][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.296586][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2698.407759][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2698.413629][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2699.367751][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2699.373645][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2700.487781][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2700.493671][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2701.447730][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.453582][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.567780][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.574278][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.527755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.533612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2704.647768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2704.654046][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2705.607758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2705.613986][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2706.727801][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2706.733778][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.687746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.693597][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.807802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.813652][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2709.767780][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2709.773617][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2710.887874][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2710.893840][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2711.847779][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2711.854418][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2712.967768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2712.973648][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.927746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.933611][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2715.047910][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2715.053758][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2716.007756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2716.013612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.127774][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.133618][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2718.087760][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.093630][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2719.207846][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2719.213905][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2720.167759][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2720.173615][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2721.287756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2721.293604][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.247977][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.253849][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2723.367763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2723.373685][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2724.327751][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.333602][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2725.447781][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2725.453862][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2726.407758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2726.413750][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2727.527773][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2727.533645][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.487773][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.493775][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2729.607758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2729.613782][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2730.568743][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2730.574604][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2731.687786][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2731.694332][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2732.647756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2732.653869][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.767869][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.773742][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.727729][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.733586][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2735.847772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2735.853647][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2736.807790][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2736.813660][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2737.927773][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2737.933681][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2738.887820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2738.893713][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2740.007757][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2740.013632][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2740.967761][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2740.973610][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2742.087763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2742.093614][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2743.047733][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2743.053576][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2744.167836][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2744.173690][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.127746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.133603][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2746.247779][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2746.253681][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2747.207752][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2747.213717][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2748.327772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2748.333656][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2749.287750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2749.293795][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2750.407786][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2750.413806][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.367724][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.373768][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2752.487774][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2752.493652][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2753.447753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2753.453624][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2754.567790][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2754.573661][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2755.527817][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2755.533685][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2756.647765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2756.653647][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2757.607767][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2757.613610][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2758.728455][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2758.734323][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2759.687729][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2759.694016][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2760.807806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2760.813666][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.767746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.773638][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2762.887785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2762.893641][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2763.847768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2763.853618][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2764.967799][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2764.973759][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2765.927767][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2765.933612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2767.047763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2767.053630][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2768.007728][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2768.013619][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2769.127767][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2769.133632][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2770.087753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2770.093628][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2771.207861][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2771.213811][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2772.167726][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2772.173680][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2773.287797][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2773.293681][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2774.247749][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2774.253619][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2775.367748][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2775.373598][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2776.327742][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2776.333624][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2777.447775][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2777.453664][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2778.407744][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2778.413606][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2779.527766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2779.533611][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2780.487808][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2780.493756][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2781.607791][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2781.613691][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2782.567800][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2782.573820][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2783.687789][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2783.693649][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2784.647770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2784.653621][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2785.767728][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2785.773680][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2786.737730][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2786.743582][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2787.847815][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2787.853887][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2788.808140][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2788.813987][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2789.927766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2789.933631][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2790.887779][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2790.893747][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2792.008834][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2792.014718][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2792.967735][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2792.973581][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2794.087771][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2794.093643][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2795.047746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2795.053591][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2796.167756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2796.173602][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2797.127735][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2797.133731][ C0] protocol 88fb is buggy, dev hsr_slave_1