yz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) [ 672.981735] encrypted_key: insufficient parameters specified 01:00:45 executing program 5: socketpair(0x0, 0x6, 0x800, &(0x7f0000000140)) 01:00:45 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:45 executing program 4: prctl$PR_SET_FP_MODE(0x2, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x3, [@fwd={0x7}, @union={0x3, 0x7, 0x0, 0x5, 0x1, 0x93c, [{0x6, 0x1, 0xe2}, {0x10, 0x5, 0x8}, {0xc, 0x0, 0x8}, {0x6, 0x2, 0x7}, {0x6, 0x5, 0x6}, {0xf, 0x4, 0x21b}, {0x0, 0x2, 0x20}]}, @const={0xf, 0x0, 0x0, 0xa, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1}}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @enum={0x10}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/175, 0xd3, 0xaf}, 0x20) 01:00:45 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 01:00:45 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a9", 0x1, 0xfffffffffffffffc) [ 673.085844] encrypted_key: insufficient parameters specified 01:00:45 executing program 4: prctl$PR_SET_FP_MODE(0x2, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x2) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x3, [@fwd={0x7}, @union={0x3, 0x7, 0x0, 0x5, 0x1, 0x93c, [{0x6, 0x1, 0xe2}, {0x10, 0x5, 0x8}, {0xc, 0x0, 0x8}, {0x6, 0x2, 0x7}, {0x6, 0x5, 0x6}, {0xf, 0x4, 0x21b}, {0x0, 0x2, 0x20}]}, @const={0xf, 0x0, 0x0, 0xa, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1}}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @enum={0x10}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/175, 0xd3, 0xaf}, 0x20) 01:00:45 executing program 1: prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) 01:00:45 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 673.147369] encrypted_key: insufficient parameters specified 01:00:45 executing program 5: socketpair(0x3, 0x0, 0x800, &(0x7f0000000140)) 01:00:45 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a9585f76a4", 0x5, 0xfffffffffffffffc) 01:00:45 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) [ 673.204062] encrypted_key: insufficient parameters specified 01:00:45 executing program 4: prctl$PR_SET_FP_MODE(0x2, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x3, [@fwd={0x7}, @union={0x3, 0x7, 0x0, 0x5, 0x1, 0x93c, [{0x6, 0x1, 0xe2}, {0x10, 0x5, 0x8}, {0xc, 0x0, 0x8}, {0x6, 0x2, 0x7}, {0x6, 0x5, 0x6}, {0xf, 0x4, 0x21b}, {0x0, 0x2, 0x20}]}, @const={0xf, 0x0, 0x0, 0xa, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1}}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @enum={0x10}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/175, 0xd3, 0xaf}, 0x20) 01:00:45 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a9", 0x1, 0xfffffffffffffffc) 01:00:45 executing program 1: prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) 01:00:45 executing program 5: socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 01:00:45 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a958", 0x2, 0xfffffffffffffffc) 01:00:45 executing program 4: prctl$PR_SET_FP_MODE(0x2, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x3, [@fwd={0x7}, @union={0x3, 0x7, 0x0, 0x5, 0x1, 0x93c, [{0x6, 0x1, 0xe2}, {0x10, 0x5, 0x8}, {0xc, 0x0, 0x8}, {0x6, 0x2, 0x7}, {0x6, 0x5, 0x6}, {0xf, 0x4, 0x21b}, {0x0, 0x2, 0x20}]}, @const={0xf, 0x0, 0x0, 0xa, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1}}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @enum={0x10}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/175, 0xd3, 0xaf}, 0x20) 01:00:45 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:45 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 673.372158] encrypted_key: insufficient parameters specified 01:00:45 executing program 5: socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 01:00:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x3, [@fwd={0x7}, @union={0x3, 0x7, 0x0, 0x5, 0x1, 0x93c, [{0x6, 0x1, 0xe2}, {0x10, 0x5, 0x8}, {0xc, 0x0, 0x8}, {0x6, 0x2, 0x7}, {0x6, 0x5, 0x6}, {0xf, 0x4, 0x21b}, {0x0, 0x2, 0x20}]}, @const={0xf, 0x0, 0x0, 0xa, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1}}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @enum={0x10}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/175, 0xd3, 0xaf}, 0x20) 01:00:45 executing program 1: prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:45 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a958", 0x2, 0xfffffffffffffffc) 01:00:45 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 01:00:45 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:45 executing program 5: socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 01:00:45 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 01:00:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 673.545421] encrypted_key: insufficient parameters specified 01:00:46 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a958", 0x2, 0xfffffffffffffffc) 01:00:46 executing program 5: socketpair(0x3, 0x0, 0x800, 0x0) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 01:00:46 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) [ 673.684960] encrypted_key: insufficient parameters specified 01:00:46 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a9585f76", 0x4, 0xfffffffffffffffc) 01:00:46 executing program 5: socketpair(0x3, 0x0, 0x800, 0x0) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 673.764498] encrypted_key: insufficient parameters specified 01:00:46 executing program 5: socketpair(0x3, 0x0, 0x800, 0x0) 01:00:46 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a9585f76", 0x4, 0xfffffffffffffffc) 01:00:46 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, &(0x7f0000000180)=""/175, 0x0, 0xaf}, 0x20) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 5: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x48004) prctl$PR_SET_FP_MODE(0x2, 0x1) r0 = fork() sched_setparam(r0, &(0x7f0000001680)=0x6) sched_rr_get_interval(r0, &(0x7f0000000080)) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000100)={0xffffffe0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0], &(0x7f0000000240)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 01:00:46 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a9585f76", 0x4, 0xfffffffffffffffc) 01:00:46 executing program 1: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0}, 0x20) 01:00:46 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0}, 0x20) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 3: add_key(0x0, 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0}, 0x20) 01:00:46 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 3: add_key(0x0, 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 4: prctl$PR_SET_FP_MODE(0x2, 0x2) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0x8}, 0x2) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xc5}, 0x2) 01:00:46 executing program 3: add_key(0x0, 0x0, &(0x7f0000000080)="c444a6248c837f5c", 0x8, 0xfffffffffffffffd) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:46 executing program 0: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) prctl$PR_SET_FP_MODE(0x2, 0x2) 01:00:46 executing program 0: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:46 executing program 5: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:46 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000340)={0x5d2, 0x0, 0x4, 0x0, 0x34, {r1, r2/1000+60000}, {0x4, 0x8, 0x0, 0x81, 0x0, 0x5e, "1b443e6f"}, 0x4, 0x1, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$MEDIA_REQUEST_IOC_QUEUE(r3, 0x7c80, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xa2ab, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) ioctl$vim2m_VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f0000000400)={0x4, 0x1, 0x4, 0x2000, 0x1ff, {0x0, 0xea60}, {0x5, 0x1, 0x80, 0x1, 0xe6, 0x20, "17872b09"}, 0x8, 0x1, @userptr=0x3, 0xc00000, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x4) prctl$PR_SET_FP_MODE(0x2, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vim2m\x00', 0x2, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000004c0)='/dev/vcs#\x00', 0x0, 0x101000) ioctl$vim2m_VIDIOC_DQBUF(r7, 0xc0585611, &(0x7f0000000580)={0x6e, 0x2, 0x4, 0x100000, 0xffffff81, {}, {0x1, 0x8, 0x3, 0x7f, 0x1f, 0x5, "5b7fc1f7"}, 0x1000, 0x3, @fd=r8, 0x80000001, 0x0, r5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020008000000fcdbdf2504000000060002000000000014000800697036706e6c4200000000000000000005000d000000000006001b004e20000014000800767863616e310000000000000000000006000200010e8800080009000400000000ebfcff0e4132586526462b3a937ada41e05f139cf95b539956f4da50467ea4ad753fe39127ff35f6fe5eb433b53a5de6023263506ac8f92a3844a30aab6feb45ed15c165a2c3b4"], 0x64}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) prctl$PR_SET_FP_MODE(0x2, 0x2) 01:00:47 executing program 5: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:47 executing program 0: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) prctl$PR_SET_FP_MODE(0x2, 0x2) 01:00:47 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 5: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 674.762042] encrypted_key: insufficient parameters specified 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:47 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:47 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:47 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:47 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:47 executing program 3: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:47 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000340)={0x5d2, 0x0, 0x4, 0x0, 0x34, {r1, r2/1000+60000}, {0x4, 0x8, 0x0, 0x81, 0x0, 0x5e, "1b443e6f"}, 0x4, 0x1, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$MEDIA_REQUEST_IOC_QUEUE(r3, 0x7c80, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xa2ab, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) ioctl$vim2m_VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f0000000400)={0x4, 0x1, 0x4, 0x2000, 0x1ff, {0x0, 0xea60}, {0x5, 0x1, 0x80, 0x1, 0xe6, 0x20, "17872b09"}, 0x8, 0x1, @userptr=0x3, 0xc00000, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x4) prctl$PR_SET_FP_MODE(0x2, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vim2m\x00', 0x2, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000004c0)='/dev/vcs#\x00', 0x0, 0x101000) ioctl$vim2m_VIDIOC_DQBUF(r7, 0xc0585611, &(0x7f0000000580)={0x6e, 0x2, 0x4, 0x100000, 0xffffff81, {}, {0x1, 0x8, 0x3, 0x7f, 0x1f, 0x5, "5b7fc1f7"}, 0x1000, 0x3, @fd=r8, 0x80000001, 0x0, r5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020008000000fcdbdf2504000000060002000000000014000800697036706e6c4200000000000000000005000d000000000006001b004e20000014000800767863616e310000000000000000000006000200010e8800080009000400000000ebfcff0e4132586526462b3a937ada41e05f139cf95b539956f4da50467ea4ad753fe39127ff35f6fe5eb433b53a5de6023263506ac8f92a3844a30aab6feb45ed15c165a2c3b4"], 0x64}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) [ 675.190919] encrypted_key: insufficient parameters specified [ 675.221322] encrypted_key: insufficient parameters specified 01:00:47 executing program 3: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) [ 675.251903] encrypted_key: insufficient parameters specified 01:00:47 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:47 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:47 executing program 3: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 5: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 675.353738] encrypted_key: insufficient parameters specified [ 675.391722] encrypted_key: insufficient parameters specified 01:00:47 executing program 4: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 675.427448] encrypted_key: insufficient parameters specified 01:00:47 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:47 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:47 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x80040) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:47 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:47 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 675.599814] encrypted_key: insufficient parameters specified 01:00:48 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0x10001, 0x80040) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 0: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:48 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0x10001, 0x80040) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) 01:00:48 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0x10001, 0x80040) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:48 executing program 0: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:48 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 675.819637] encrypted_key: insufficient parameters specified 01:00:48 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x80040) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) [ 675.872629] encrypted_key: insufficient parameters specified 01:00:48 executing program 0: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:48 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) [ 676.028539] encrypted_key: insufficient parameters specified [ 676.060017] encrypted_key: insufficient parameters specified 01:00:48 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) [ 676.127022] encrypted_key: insufficient parameters specified 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:48 executing program 4: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:48 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) [ 676.201437] encrypted_key: insufficient parameters specified [ 676.237807] encrypted_key: insufficient parameters specified 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 4: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) [ 676.293271] encrypted_key: insufficient parameters specified 01:00:48 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 676.360235] encrypted_key: insufficient parameters specified [ 676.384434] encrypted_key: insufficient parameters specified 01:00:48 executing program 4: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f00000001c0)={0x40, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) [ 676.427472] encrypted_key: insufficient parameters specified 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:48 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:48 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:48 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, 0x0) [ 676.517733] encrypted_key: insufficient parameters specified [ 676.549013] encrypted_key: insufficient parameters specified 01:00:48 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) 01:00:48 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) [ 676.575983] encrypted_key: insufficient parameters specified 01:00:49 executing program 3: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:49 executing program 5: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) [ 676.647190] encrypted_key: insufficient parameters specified [ 676.674838] encrypted_key: insufficient parameters specified 01:00:49 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:49 executing program 3: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) [ 676.715831] encrypted_key: insufficient parameters specified 01:00:49 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:49 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) [ 676.764670] encrypted_key: insufficient parameters specified 01:00:49 executing program 5: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 3: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 676.848729] encrypted_key: insufficient parameters specified [ 676.867198] encrypted_key: insufficient parameters specified 01:00:49 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 5: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:49 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 676.959142] encrypted_key: insufficient parameters specified 01:00:49 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 4: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:49 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 4: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) 01:00:49 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) [ 677.177229] encrypted_key: insufficient parameters specified 01:00:49 executing program 4: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0x40001) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000100)) 01:00:49 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:49 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 677.261890] encrypted_key: insufficient parameters specified 01:00:49 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:49 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0x40001) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000100)) 01:00:49 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:49 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0x40001) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000100)) 01:00:49 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:49 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:49 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a6", 0x3, 0xfffffffffffffffd) 01:00:49 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:49 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:49 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000080)="c444a624", 0x4, 0xfffffffffffffffd) 01:00:49 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0x40001) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:50 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0x40001) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) 01:00:50 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0x40001) 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:50 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 677.827370] encrypted_key: insufficient parameters specified 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 1: socketpair(0x2, 0x5, 0x9748, &(0x7f0000000a00)) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) [ 678.056808] encrypted_key: insufficient parameters specified 01:00:50 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 1: socketpair(0x0, 0x5, 0x9748, &(0x7f0000000a00)) [ 678.182416] encrypted_key: insufficient parameters specified 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:50 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 1: socketpair(0x0, 0x5, 0x9748, &(0x7f0000000a00)) 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 678.332160] encrypted_key: insufficient parameters specified 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c444", 0x2, 0xfffffffffffffffd) 01:00:50 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:50 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) 01:00:50 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) [ 678.462923] encrypted_key: insufficient parameters specified 01:00:50 executing program 1: socketpair(0x0, 0x5, 0x9748, &(0x7f0000000a00)) 01:00:50 executing program 3: socketpair(0x0, 0x5, 0x9748, &(0x7f0000000a00)) 01:00:50 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 678.517618] encrypted_key: insufficient parameters specified 01:00:50 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 1: socketpair(0x2, 0x0, 0x9748, &(0x7f0000000a00)) 01:00:51 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 0: socketpair(0x0, 0x5, 0x9748, &(0x7f0000000a00)) 01:00:51 executing program 3: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 5: prctl$PR_SET_FP_MODE(0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) keyctl$clear(0x7, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x2000) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) 01:00:51 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 1: socketpair(0x2, 0x0, 0x0, &(0x7f0000000a00)) 01:00:51 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xa2af, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) r1 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x0, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000000)) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="6f000000988c92005145b881643c3006c6ffb7d5a114ab1ca337bd0b02000000f8b070d72cb86b7f8fd021f68cbaa72ef8c980fd37e5fc69b5484540a9952b2d9d86e2d26f94fffdb403b28d0aca6236db34ba99a22c60dc3c60863c4571ed005a77d733a143e9a7c671e329dffefe22fea9ce6a91aa24f31ef8a98216f74f40621bb81e583a", @ANYRESDEC, @ANYBLOB="000428bd7000ffdbdf25010000000000000008410000004c0018ffffffb273797a3100"/98], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x4) prctl$PR_SET_FP_MODE(0x4, 0x0) clock_gettime(0x7, &(0x7f0000000080)) 01:00:51 executing program 3: socket$inet(0x2, 0x5, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x0, 0x20, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x48050}, 0x44) prctl$PR_SET_FP_MODE(0x4, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r2, 0x20, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x18, 0x18, {0x9, @bearer=@l2={'eth', 0x3a, 'ip6erspan0\x00'}}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000050) 01:00:51 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 0: syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0xa0100) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x400) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x0, 0x7fff, 0x2}) prctl$PR_SET_FP_MODE(0x2, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) 01:00:51 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c4", 0x1, 0xfffffffffffffffd) 01:00:51 executing program 1: socketpair(0x2, 0x0, 0x0, &(0x7f0000000a00)) 01:00:51 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xa2af, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) r1 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x0, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000000)) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="6f000000988c92005145b881643c3006c6ffb7d5a114ab1ca337bd0b02000000f8b070d72cb86b7f8fd021f68cbaa72ef8c980fd37e5fc69b5484540a9952b2d9d86e2d26f94fffdb403b28d0aca6236db34ba99a22c60dc3c60863c4571ed005a77d733a143e9a7c671e329dffefe22fea9ce6a91aa24f31ef8a98216f74f40621bb81e583a", @ANYRESDEC, @ANYBLOB="000428bd7000ffdbdf25010000000000000008410000004c0018ffffffb273797a3100"/98], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x4) prctl$PR_SET_FP_MODE(0x4, 0x0) clock_gettime(0x7, &(0x7f0000000080)) 01:00:51 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x2) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xfff, 0x105b01) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) 01:00:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x9, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000010}, 0x40800) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x48051) 01:00:51 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) prctl$PR_SET_FP_MODE(0x2, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) [ 678.988811] encrypted_key: insufficient parameters specified 01:00:51 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xa2af, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) r1 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x0, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000000)) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="6f000000988c92005145b881643c3006c6ffb7d5a114ab1ca337bd0b02000000f8b070d72cb86b7f8fd021f68cbaa72ef8c980fd37e5fc69b5484540a9952b2d9d86e2d26f94fffdb403b28d0aca6236db34ba99a22c60dc3c60863c4571ed005a77d733a143e9a7c671e329dffefe22fea9ce6a91aa24f31ef8a98216f74f40621bb81e583a", @ANYRESDEC, @ANYBLOB="000428bd7000ffdbdf25010000000000000008410000004c0018ffffffb273797a3100"/98], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x4) prctl$PR_SET_FP_MODE(0x4, 0x0) clock_gettime(0x7, &(0x7f0000000080)) 01:00:51 executing program 1: socketpair(0x2, 0x0, 0x0, &(0x7f0000000a00)) 01:00:51 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) prctl$PR_SET_FP_MODE(0x2, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) 01:00:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:00:51 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xee00, r0) prctl$PR_SET_FP_MODE(0x4, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) 01:00:51 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) prctl$PR_SET_FP_MODE(0x2, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) 01:00:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:00:51 executing program 3: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x80000000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00', r0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x5c, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xc}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3f}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x101}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffdf}]}, 0x5c}}, 0x804) prctl$PR_SET_FP_MODE(0x2d, 0x3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x26df5956b1367af3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r4, 0x80083313, &(0x7f0000000440)) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='L\x00\n\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fedbdf2502000000060002000000000006001c00040000000500220000000000080011000100000005001400cf000000050012000400000006000e0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x810}, 0x4004) 01:00:51 executing program 4: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 01:00:51 executing program 1: socketpair(0x2, 0x0, 0x9748, 0x0) 01:00:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xee00, r0) prctl$PR_SET_FP_MODE(0x4, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) 01:00:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:00:51 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x80000000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00', r0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x5c, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xc}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3f}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x101}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffdf}]}, 0x5c}}, 0x804) prctl$PR_SET_FP_MODE(0x2d, 0x3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x26df5956b1367af3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r4, 0x80083313, &(0x7f0000000440)) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='L\x00\n\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fedbdf2502000000060002000000000006001c00040000000500220000000000080011000100000005001400cf000000050012000400000006000e0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x810}, 0x4004) 01:00:51 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x1) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) prctl$PR_SET_FP_MODE(0x2d, 0x0) 01:00:51 executing program 1: socketpair(0x2, 0x0, 0x9748, 0x0) 01:00:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xee00, r0) prctl$PR_SET_FP_MODE(0x4, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) 01:00:51 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) prctl$PR_SET_FP_MODE(0x2, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) 01:00:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:51 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:51 executing program 1: socketpair(0x2, 0x0, 0x9748, 0x0) 01:00:51 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x1) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) prctl$PR_SET_FP_MODE(0x2d, 0x0) 01:00:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xee00, r0) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x1) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) prctl$PR_SET_FP_MODE(0x2d, 0x0) 01:00:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:52 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) prctl$PR_SET_FP_MODE(0x2, 0x0) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:52 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x1) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:52 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:52 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x1) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:52 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:52 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x1) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) 01:00:52 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 5: keyctl$link(0x8, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:52 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x1) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:52 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:52 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:52 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:52 executing program 5: keyctl$link(0x8, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:52 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:52 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) 01:00:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:52 executing program 1: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:53 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:53 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) 01:00:53 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:53 executing program 2: openat$snapshot(0xffffffffffffff9c, 0x0, 0x8001, 0x0) 01:00:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:53 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:53 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:53 executing program 2: openat$snapshot(0xffffffffffffff9c, 0x0, 0x8001, 0x0) 01:00:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:53 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:53 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:53 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:53 executing program 2: openat$snapshot(0xffffffffffffff9c, 0x0, 0x8001, 0x0) 01:00:53 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) 01:00:53 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:53 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:53 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 01:00:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:53 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:53 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25, 0x1}) 01:00:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 01:00:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x4) 01:00:53 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) 01:00:53 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 01:00:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:53 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:53 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 01:00:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 01:00:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x4) 01:00:53 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:53 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 01:00:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x40) 01:00:53 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x8001, 0x0) 01:00:53 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:53 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x4) 01:00:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x38) 01:00:53 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x8001, 0x0) 01:00:53 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 01:00:53 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x30) 01:00:54 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x8001, 0x0) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}], &(0x7f00000000c0)=0x28) 01:00:54 executing program 2: getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f00000000c0)=0x20) 01:00:54 executing program 2: getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 01:00:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:54 executing program 2: getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)=0x18) 01:00:54 executing program 1: ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 01:00:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}], &(0x7f00000000c0)=0x10) 01:00:54 executing program 1: ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)=0x18) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], &(0x7f00000000c0)=0x8) 01:00:54 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 1: ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040), &(0x7f00000000c0)) 01:00:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, &(0x7f00000000c0)) 01:00:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:54 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:54 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:54 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:54 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:55 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 01:00:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040), &(0x7f00000000c0)) 01:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040), &(0x7f00000000c0)) 01:00:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 3: ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25}) 01:00:55 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 01:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:55 executing program 3: ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25}) 01:00:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], 0x0) 01:00:55 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 01:00:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x4) 01:00:55 executing program 3: ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25}) 01:00:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], 0x0) 01:00:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x0, 0x1}) 01:00:55 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}], 0x0) 01:00:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 01:00:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x25}) 01:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:55 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:55 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 01:00:55 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:55 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:55 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25}) 01:00:55 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8001, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x8, 0xf0f9}) prctl$PR_SET_FP_MODE(0x2, 0x0) 01:00:56 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)) 01:00:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25}) 01:00:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:56 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)) 01:00:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000040)={0x25}) 01:00:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:56 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000100)={0x400, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) 01:00:56 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000100)={0x400, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) 01:00:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:56 executing program 2: keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000100)={0x400, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) 01:00:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000100)={0x400, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) 01:00:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:56 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000100)={0x400, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) 01:00:56 executing program 2: keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000100)={0x400, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) 01:00:56 executing program 2: keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 01:00:56 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:56 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:56 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:56 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)) 01:00:56 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r1, 0x1}, 0x14}}, 0x4) 01:00:56 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:56 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) prctl$PR_SET_FP_MODE(0x3, 0x0) 01:00:56 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)) 01:00:56 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x3c}}, 0x800) 01:00:57 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r1, 0x1}, 0x14}}, 0x0) 01:00:57 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)) 01:00:57 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) 01:00:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:57 executing program 0: syz_genetlink_get_family_id$wireguard(&(0x7f0000000000)='wireguard\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x34, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x400, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xfd, 0x30eb, 0x5, 0x20000000}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) 01:00:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x4) 01:00:57 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x9) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) 01:00:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:57 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x9) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:00:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, r0) 01:00:57 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x4) 01:00:57 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:00:57 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x9) 01:00:57 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x4) 01:00:57 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) socket$can_raw(0x1d, 0x3, 0x1) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) 01:00:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:57 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:57 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) 01:00:57 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) 01:00:57 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) 01:00:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:57 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee00, 0x0) 01:00:57 executing program 4: wait4(0xffffffffffffffff, &(0x7f0000000140), 0x1, &(0x7f0000000180)) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:57 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) 01:00:57 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x9) 01:00:57 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) 01:00:57 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:57 executing program 4: wait4(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180)) 01:00:57 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc064}, 0x44055) 01:00:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:57 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x9) 01:00:58 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:58 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 4: wait4(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) 01:00:58 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7800, 0x8, 0x2, 0xfffffff8, {{0x16, 0x4, 0x2, 0x13, 0x58, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0xf, 0xdb, [@private=0xa010100, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x2c, 0xe7, 0x3, 0x6, [{@broadcast, 0x9e}, {@local, 0xff}, {@rand_addr=0x64010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty, 0x2a62}]}, @rr={0x7, 0x7, 0xd5, [@loopback]}]}}}}}) 01:00:58 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:00:58 executing program 4: wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:00:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x9) 01:00:58 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) 01:00:58 executing program 3: syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:00:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20a180) 01:00:58 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:58 executing program 3: socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) 01:00:58 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) socketpair(0x1a, 0x3, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 3: socketpair(0x0, 0x3, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:58 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0xd6d23faa0c0c6b48) accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) accept$ax25(r0, 0x0, &(0x7f0000000040)) 01:00:58 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) 01:00:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:58 executing program 3: socketpair(0x0, 0x3, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) prctl$PR_SET_FP_MODE(0x4, 0x3) 01:00:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:00:58 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc005}, 0x800) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:58 executing program 3: socketpair(0x0, 0x3, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x100}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x75be}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4048042) 01:00:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:00:58 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:58 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) 01:00:58 executing program 2: syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x1, 0x12140) 01:00:58 executing program 3: socketpair(0x1a, 0x0, 0x1002, &(0x7f0000000080)) 01:00:58 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:59 executing program 2: syz_open_dev$vcsn(0x0, 0x1, 0x12140) 01:00:59 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:00:59 executing program 3: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000080)) 01:00:59 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:59 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:59 executing program 2: syz_open_dev$vcsn(0x0, 0x1, 0x12140) 01:00:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) 01:00:59 executing program 3: socketpair(0x1a, 0x0, 0x0, 0x0) 01:00:59 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:59 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000240), 0x10) 01:00:59 executing program 2: syz_open_dev$vcsn(0x0, 0x1, 0x12140) 01:00:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:00:59 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:59 executing program 3: socketpair(0x1a, 0x0, 0x0, 0x0) 01:00:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:59 executing program 1: bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 01:00:59 executing program 2: syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x0, 0x12140) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:59 executing program 3: socketpair(0x1a, 0x0, 0x0, 0x0) 01:00:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) 01:00:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) [ 687.155448] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.161074] ieee802154 phy1 wpan1: encryption failed: -22 01:00:59 executing program 2: syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x0, 0x0) 01:00:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:00:59 executing program 1: bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:00:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) 01:00:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) 01:00:59 executing program 2: syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x0, 0x0) 01:00:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:00:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 01:00:59 executing program 1: bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 01:00:59 executing program 2: syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x0, 0x0) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r1, 0x1}, 0x14}}, 0x4) 01:00:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:00:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) 01:00:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r1, 0x1}, 0x14}}, 0x0) 01:00:59 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 01:00:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:01:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) 01:01:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) 01:01:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000015c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x28, r1, 0x1, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:01:00 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 01:01:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:01:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) 01:01:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:01:00 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 01:01:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 01:01:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000380)=0x800, 0x4) 01:01:00 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)={0xffffffffffffffff}) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 01:01:00 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)={0xffffffffffffffff}) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 01:01:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) 01:01:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:00 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)={0xffffffffffffffff}) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) 01:01:00 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)={0xffffffffffffffff}) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 01:01:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:00 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)={0xffffffffffffffff}) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:00 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)={0xffffffffffffffff}) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 01:01:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x400, r1) 01:01:00 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:00 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, 0xfffffffffffffffd) 01:01:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:01 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:01 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) 01:01:01 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 01:01:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:01 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1}) 01:01:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:01 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) 01:01:01 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) 01:01:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:01 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:01 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) 01:01:01 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:01 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:01 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) socket$nl_route(0x10, 0x3, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:01 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 01:01:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:01 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:01 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:02 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r1 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r1}) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:02 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:02 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r1 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:02 executing program 4: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:02 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 4: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:02 executing program 0: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 3: socket$nl_route(0x10, 0x3, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:02 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:02 executing program 0: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:02 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 4: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:02 executing program 5: prctl$PR_SET_FP_MODE(0x4, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:02 executing program 3: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:02 executing program 0: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 2: socket$nl_route(0x10, 0x3, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:02 executing program 5: socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:02 executing program 3: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:02 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:02 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:02 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:02 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 5: socketpair(0x0, 0x5, 0xa8, &(0x7f0000000740)) 01:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:03 executing program 3: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:03 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:03 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 2: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:03 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:03 executing program 5: socketpair(0x0, 0x5, 0xa8, &(0x7f0000000740)) 01:01:03 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:03 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:03 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 2: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:03 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:03 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:03 executing program 5: socketpair(0x0, 0x5, 0xa8, &(0x7f0000000740)) 01:01:03 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:03 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 2: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:03 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:03 executing program 5: socketpair(0x10, 0x0, 0xa8, &(0x7f0000000740)) 01:01:03 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:03 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:03 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:03 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000740)) 01:01:03 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:03 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x4040810) 01:01:03 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:03 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 5: socketpair(0x10, 0x0, 0x0, 0x0) 01:01:03 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:03 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:03 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x4040810) 01:01:03 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 5: socketpair(0x10, 0x0, 0x0, 0x0) 01:01:03 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:03 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:03 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:03 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x4040810) 01:01:04 executing program 5: socketpair(0x10, 0x0, 0x0, 0x0) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:04 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:04 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:04 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:04 executing program 5: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:04 executing program 5: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:04 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:04 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:04 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 5: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:04 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:04 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:04 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:04 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:04 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) 01:01:04 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:04 executing program 5: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:04 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:04 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) 01:01:04 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:04 executing program 5: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:04 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:04 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:04 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:04 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={0x0}}, 0x4040810) 01:01:04 executing program 5: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:05 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:05 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={0x0}}, 0x0) 01:01:05 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:05 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:05 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:05 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:05 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 2: add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:05 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:05 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:05 executing program 4: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:05 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:05 executing program 4: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:05 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:05 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:05 executing program 4: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:05 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0) 01:01:05 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:06 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 01:01:06 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:06 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:06 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0) 01:01:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:06 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:06 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:06 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 2: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 01:01:06 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0) 01:01:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:06 executing program 5: add_key(0x0, 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:06 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:06 executing program 2: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:06 executing program 5: add_key(0x0, 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:06 executing program 3: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:06 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, r1) 01:01:06 executing program 2: socket$nl_route(0x10, 0x3, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:06 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:06 executing program 1: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, r1) 01:01:06 executing program 5: add_key(0x0, 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:06 executing program 2: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, r1) 01:01:06 executing program 1: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 0: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 3: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:06 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, r1) 01:01:06 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 01:01:06 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:06 executing program 1: r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:06 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:06 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:06 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:06 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:07 executing program 0: add_key(0x0, 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:07 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:07 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:07 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:07 executing program 0: add_key(0x0, 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:07 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:07 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:07 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:07 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:07 executing program 0: add_key(0x0, 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) 01:01:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:07 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:07 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:07 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) 01:01:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:07 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:07 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:07 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24deec0d", @ANYRES16=0x0, @ANYBLOB="100025bd7000fddbdf250000000006001d000900000008000c0003000000"], 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24000040) 01:01:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:07 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:07 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:07 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) 01:01:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:07 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:07 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:07 executing program 3: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1cf4bc5d, 0x3, 0x4, 0x1000, 0x2, {}, {0x1, 0x8, 0x8, 0x71, 0x0, 0xfc, "01000020"}, 0x8bc, 0x62f1adc7930da4d9, @fd, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x24, 0x4, 0x4, 0x4908, 0x9, {0x77359400}, {0x5, 0x2, 0x0, 0x1, 0x5, 0x8, "c6e19b98"}, 0x2, 0x1, @fd=r5, 0x8, 0x0, r6}) 01:01:07 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:07 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) 01:01:07 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:07 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) 01:01:07 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:07 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r2) 01:01:07 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:08 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x7, 0x157400) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4000000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000900)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x20, 0x1f, {{0x1c, 0x4, 0x1, 0xa, 0x70, 0x67, 0x0, 0x7f, 0x4, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x21}, {[@timestamp_addr={0x44, 0x2c, 0x76, 0x1, 0x8, [{@remote, 0xa09}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1400000}, {@multicast2, 0x30000000}, {@empty, 0xa93}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x34, 0x3, 0x9, [{@multicast1}, {@loopback}, {@loopback, 0x3}, {@rand_addr=0x64010100, 0x2}, {@local, 0xb65c}]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@bridge_getlink={0x3c, 0x12, 0x300, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x1025, 0x2121}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'bond0\x00'}, @IFLA_TXQLEN={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4040810) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0x9, 0x4, 0xe000, 0x10000, {}, {0x4, 0x8, 0x71, 0x80, 0xfb, 0x7f, "d0a9e469"}, 0x0, 0x4, @fd, 0xe98}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="28489500359d9ce55cc01eba7f", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25010000000c000f00070000000000000005000d0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) socketpair(0x10, 0x5, 0xa8, &(0x7f0000000740)) 01:01:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000002000000125bd7000fbdbdf250abc20007f000007040000001400edfffe8000000000000000000000000000aa14000100fc0200"/68], 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00', 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2b100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250e000000a280d7fb705e216503cccc3010afd293933f28990d287e51155ed894ff563297b1b870737378ac81c70665a1f566201121a24decd217cb2cf16814fe53ae589d0c92c90407b3b8070255ae872951162014b9c23a0b791fe1"], 0x14}, 0x1, 0x0, 0x0, 0x4810}, 0x44001) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000640)=0x1, 0x4) clock_gettime(0x6, &(0x7f0000000600)) r1 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e041b58ba4d685ea9c507aea2a31b7f9137f864a4622f8e2a1df9bdf20da636b08c6f17c209fc260f0cf6621729f9ecc16fa7b1f0d5a2dbf5fc9b9d4031563bff8d8238b77bb772f337595fbb29774e5da4f6d432029de920fb3ce3a497ce1f50bdebc3b16218cf30d29c", 0xd3, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:08 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000000)={0x3, @bcast}) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_FP_MODE(0x8, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 01:01:08 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x42c, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x40) prctl$PR_SET_FP_MODE(0x2, 0x0) 01:01:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x42c, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x40) prctl$PR_SET_FP_MODE(0x2, 0x0) 01:01:08 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:08 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b3", 0x35, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x42c, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x40) prctl$PR_SET_FP_MODE(0x2, 0x0) 01:01:08 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa7719e7640f3b17358c51b86ab900d1b9ebf9971cc8c56d30daa74b35256df389bd3f555cc65b0efb5157917c0caf128017d0ab877f131fcceb30c20e12a6792e6fbe1e70208816ddccc9b7d959f4b2e04", 0x6a, 0xfffffffffffffffd) 01:01:08 executing program 5: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:08 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:08 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:08 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) 01:01:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x42c, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x40) prctl$PR_SET_FP_MODE(0x2, 0x0) 01:01:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x10000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6cfe}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000010}, 0x40000) prctl$PR_SET_FP_MODE(0x2, 0x3) prctl$PR_SET_FP_MODE(0x2d, 0x0) 01:01:08 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:08 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:08 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:08 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:08 executing program 5: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$ax25(r4, &(0x7f0000000180)={{0x3, @bcast}, [@rose, @netrom, @remote, @null, @default, @rose, @remote, @bcast]}, &(0x7f0000000780)=0x48) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@null, @rose, @remote, @default, @rose, @remote, @default, @null]}, &(0x7f0000000140)=0x48, 0x80c00) prctl$PR_SET_FP_MODE(0x2, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000240), &(0x7f00000007c0)=0x4) 01:01:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x42c, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x40) 01:01:08 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x0) keyctl$clear(0x7, 0x0) 01:01:08 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:08 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:08 executing program 5: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$ax25(r4, &(0x7f0000000180)={{0x3, @bcast}, [@rose, @netrom, @remote, @null, @default, @rose, @remote, @bcast]}, &(0x7f0000000780)=0x48) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@null, @rose, @remote, @default, @rose, @remote, @default, @null]}, &(0x7f0000000140)=0x48, 0x80c00) prctl$PR_SET_FP_MODE(0x2, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000240), &(0x7f00000007c0)=0x4) 01:01:08 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x0) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:08 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x0) keyctl$clear(0x7, 0x0) 01:01:08 executing program 0: add_key(&(0x7f00000003c0)='big_key\x00', 0x0, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) 01:01:08 executing program 4: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:08 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa771", 0x1b, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:08 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:08 executing program 5: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$ax25(r4, &(0x7f0000000180)={{0x3, @bcast}, [@rose, @netrom, @remote, @null, @default, @rose, @remote, @bcast]}, &(0x7f0000000780)=0x48) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@null, @rose, @remote, @default, @rose, @remote, @default, @null]}, &(0x7f0000000140)=0x48, 0x80c00) prctl$PR_SET_FP_MODE(0x2, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000240), &(0x7f00000007c0)=0x4) 01:01:08 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x9) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:09 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x0) keyctl$clear(0x7, 0x0) 01:01:09 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:09 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:09 executing program 4: add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:09 executing program 5: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$ax25(r4, &(0x7f0000000180)={{0x3, @bcast}, [@rose, @netrom, @remote, @null, @default, @rose, @remote, @bcast]}, &(0x7f0000000780)=0x48) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@null, @rose, @remote, @default, @rose, @remote, @default, @null]}, &(0x7f0000000140)=0x48, 0x80c00) prctl$PR_SET_FP_MODE(0x2, 0x0) 01:01:09 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x9) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:09 executing program 3: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:09 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:09 executing program 4: add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:09 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:09 executing program 5: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$ax25(r4, &(0x7f0000000180)={{0x3, @bcast}, [@rose, @netrom, @remote, @null, @default, @rose, @remote, @bcast]}, &(0x7f0000000780)=0x48) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@null, @rose, @remote, @default, @rose, @remote, @default, @null]}, &(0x7f0000000140)=0x48, 0x80c00) 01:01:09 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x9) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:09 executing program 3: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:09 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:09 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:09 executing program 4: add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 01:01:09 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:09 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) accept$ax25(r3, &(0x7f0000000180)={{0x3, @bcast}, [@rose, @netrom, @remote, @null, @default, @rose, @remote, @bcast]}, &(0x7f0000000780)=0x48) 01:01:09 executing program 3: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:09 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:09 executing program 4: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:09 executing program 3: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:09 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:09 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) 01:01:09 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:09 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:09 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:09 executing program 4: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:09 executing program 3: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:09 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:09 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:09 executing program 4: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:09 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:09 executing program 3: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:09 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:09 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:09 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 01:01:09 executing program 4: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:09 executing program 3: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 01:01:10 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:10 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 0: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:10 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) socket$nl_generic(0x10, 0x3, 0x10) 01:01:10 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) 01:01:10 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 4: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x0) 01:01:10 executing program 0: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:10 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:10 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:10 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x0) 01:01:10 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) 01:01:10 executing program 1: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:10 executing program 0: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:10 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) 01:01:10 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:10 executing program 1: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:10 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) 01:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x0) 01:01:10 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:10 executing program 1: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:10 executing program 5: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)) 01:01:10 executing program 4: add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r0) 01:01:10 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 01:01:10 executing program 3: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@default, @remote, @bcast, @netrom, @rose, @remote, @null, @default]}, &(0x7f0000000080)=0x48, 0x0) socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f0000000680)=""/187, 0xbb}, 0x2021) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) 01:01:10 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 01:01:10 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:10 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:10 executing program 5: socketpair(0x8, 0x5, 0x7ff, &(0x7f0000000200)) 01:01:10 executing program 3: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="8557e93d23607aafd0a03bbf730e97d8dbe583fcc3b1ea6e3fa771", 0x1b, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 01:01:10 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x0) 01:01:10 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:10 executing program 5: socketpair(0x0, 0x5, 0x7ff, &(0x7f0000000200)) 01:01:10 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f00000005c0)={'syz', 0x1}, r1) 01:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 01:01:10 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x20, 0x70bd29, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xaff}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x48040) r4 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x7abafc44, 0x480) getsockopt$ax25_int(r4, 0x101, 0x2, &(0x7f0000000600), &(0x7f0000000640)=0x4) 01:01:11 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:11 executing program 5: socketpair(0x0, 0x5, 0x7ff, &(0x7f0000000200)) 01:01:11 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, r1) 01:01:11 executing program 0: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x0) 01:01:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 01:01:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x20, 0x70bd29, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xaff}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x48040) r4 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x7abafc44, 0x480) getsockopt$ax25_int(r4, 0x101, 0x2, &(0x7f0000000600), &(0x7f0000000640)=0x4) 01:01:11 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) write$snapshot(0xffffffffffffffff, &(0x7f0000000140)="691ccbec0600000000000000ab78479e12a92360ad675efaec57bb98881c7f21e3c96c07799b803adfc08b253e678d63000000000000bdf82426320098cfd225a20b130e75196de9ce85e17c0148930b5e906e4b93676fae2915f17831c32433c92d9fb3ba27d546d3255402108ad4f5893ae775dca69d01e6fa7b67e7950ccaedac7f13b8cc730703b7c10000000000000000", 0x93) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0xe5, 0x3, 0x2, r1, 0x0, [], 0x0, r2, 0x2, 0x2, 0x2}, 0x40) prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:11 executing program 5: socketpair(0x0, 0x5, 0x7ff, &(0x7f0000000200)) 01:01:11 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, r1) 01:01:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 01:01:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x20, 0x70bd29, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xaff}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x48040) r4 = syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x7abafc44, 0x480) getsockopt$ax25_int(r4, 0x101, 0x2, &(0x7f0000000600), &(0x7f0000000640)=0x4) 01:01:11 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0xe5, 0x3, 0x2, r1, 0x0, [], 0x0, r2, 0x2, 0x2, 0x2}, 0x40) prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:11 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', 0x0, r1) 01:01:11 executing program 5: socketpair(0x8, 0x0, 0x7ff, &(0x7f0000000200)) 01:01:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffea2, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x20, 0x70bd29, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xaff}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x48040) syz_open_dev$vcsn(&(0x7f00000005c0)='/dev/vcs#\x00', 0x7abafc44, 0x480) 01:01:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0xe5, 0x3, 0x2, r1, 0x0, [], 0x0, r2, 0x2, 0x2, 0x2}, 0x40) prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:11 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:11 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:11 executing program 5: socketpair(0x8, 0x0, 0x0, &(0x7f0000000200)) 01:01:11 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x6, r1) 01:01:11 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x20, 0x70bd29, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xaff}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x48040) 01:01:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0xe5, 0x3, 0x2, r1, 0x0, [], 0x0, r2, 0x2, 0x2, 0x2}, 0x40) 01:01:11 executing program 5: socketpair(0x8, 0x0, 0x0, 0x0) 01:01:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x6, r1) 01:01:11 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0xc4) 01:01:11 executing program 1: r0 = add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="85", 0x1, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0) 01:01:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) 01:01:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:11 executing program 5: socketpair(0x8, 0x0, 0x0, 0x0) 01:01:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x6, r1) 01:01:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:11 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x6, r1) 01:01:11 executing program 5: socketpair(0x8, 0x0, 0x0, 0x0) 01:01:11 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:12 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:12 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:12 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:12 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000300), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000000340), 0x4) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x20, 0xffff, @udp='udp:syz0\x00'}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x8800}, 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x5529, 0x5c002) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@bridge_newvlan={0x90, 0x70, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x2}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x8}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x5, 0x2}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x7b, 0x4}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x21, 0x3}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xa}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x4}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x90}, 0x1, 0x0, 0x0, 0x800}, 0x0) prctl$PR_SET_FP_MODE(0x3, 0x0) 01:01:12 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:12 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:12 executing program 1: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) 01:01:12 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000300), 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000000340), 0x4) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x20, 0xffff, @udp='udp:syz0\x00'}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x8800}, 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x5529, 0x5c002) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@bridge_newvlan={0x90, 0x70, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x2}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x8}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x5, 0x2}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x7b, 0x4}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x21, 0x3}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xa}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x4}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x90}, 0x1, 0x0, 0x0, 0x800}, 0x0) prctl$PR_SET_FP_MODE(0x3, 0x0) 01:01:12 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:12 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x0) 01:01:12 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) prctl$PR_SET_FP_MODE(0x2, 0x3) 01:01:12 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) 01:01:12 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:12 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) prctl$PR_SET_FP_MODE(0x2, 0x3) 01:01:12 executing program 4: prctl$PR_SET_FP_MODE(0x4, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x0) 01:01:12 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 0: ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x73da) 01:01:12 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) prctl$PR_SET_FP_MODE(0x2, 0x3) 01:01:12 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) prctl$PR_SET_FP_MODE(0x2, 0x3) 01:01:12 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:12 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 0: ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x73da) 01:01:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:12 executing program 0: ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x73da) 01:01:12 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) prctl$PR_SET_FP_MODE(0x2, 0x3) 01:01:12 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) prctl$PR_SET_FP_MODE(0x2, 0x3) 01:01:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:12 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) 01:01:12 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) prctl$PR_SET_FP_MODE(0x2, 0x4) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:13 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) 01:01:13 executing program 3: syz_open_dev$dri(0x0, 0x1, 0x80) 01:01:13 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:13 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) 01:01:13 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) 01:01:13 executing program 2: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:13 executing program 3: syz_open_dev$dri(0x0, 0x1, 0x80) 01:01:13 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x2201) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) 01:01:13 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:13 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:13 executing program 2: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:13 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="30944da0e29479bf43fcece380898a9f892e60044a656143da589d419147d8ef46bbf717f59832b2e93249cf5012e89e293fee349abedbd6fc2a284fd6c038a2caf13fe3d9a6185f9a7a281377a868f9e19eb31d831ec254737e6b0280447ed1f7996f938d9d8d52c1b528089a1551406da06ea71ad250f7684a6a4606ca9770c71a2f61ef05a3535ecc4e69a0104150c7e2f83816eb83e924465c7c922ec2f1b5bf3fa4454d948f05bb3b13d04f01d1754d0000000000e81184b6e3ead3e025cabae2e8e6774da307d0b9933ef1ff307d5c4e15db14287677bd3c74a6814db278a936cdb2d0d7b9aba99c21978c5c0389010889e63d1148d0305741aedaa9b65b9706002eaa9d62122fbecd252618ee7964821c7d", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:13 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x73da) 01:01:13 executing program 4: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:13 executing program 3: syz_open_dev$dri(0x0, 0x1, 0x80) 01:01:13 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:13 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="30944da0e29479bf43fcece380898a9f892e60044a656143da589d419147d8ef46bbf717f59832b2e93249cf5012e89e293fee349abedbd6fc2a284fd6c038a2caf13fe3d9a6185f9a7a281377a868f9e19eb31d831ec254737e6b0280447ed1f7996f938d9d8d52c1b528089a1551406da06ea71ad250f7684a6a4606ca9770c71a2f61ef05a3535ecc4e69a0104150c7e2f83816eb83e924465c7c922ec2f1b5bf3fa4454d948f05bb3b13d04f01d1754d0000000000e81184b6e3ead3e025cabae2e8e6774da307d0b9933ef1ff307d5c4e15db14287677bd3c74a6814db278a936cdb2d0d7b9aba99c21978c5c0389010889e63d1148d0305741aedaa9b65b9706002eaa9d62122fbecd252618ee7964821c7d", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:13 executing program 2: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:13 executing program 0: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x73da) 01:01:13 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x80) 01:01:13 executing program 4: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:13 executing program 0: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x73da) 01:01:13 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:13 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:13 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:13 executing program 4: syz_open_dev$dri(0x0, 0x1, 0x80) 01:01:13 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) 01:01:13 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:13 executing program 0: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x73da) 01:01:13 executing program 4: syz_open_dev$dri(0x0, 0x1, 0x80) 01:01:13 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:13 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:13 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) 01:01:13 executing program 4: syz_open_dev$dri(0x0, 0x1, 0x80) 01:01:13 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:13 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:13 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = fork() wait4(r1, &(0x7f0000000240), 0x1000000, 0x0) 01:01:14 executing program 4: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x80) 01:01:14 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:14 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) r2 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:14 executing program 4: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:14 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) wait4(0x0, &(0x7f0000000240), 0x1000000, 0x0) 01:01:14 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:14 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="30944da0e29479bf43fcece380898a9f892e60044a656143da589d419147d8ef46bbf717f59832b2e93249cf5012e89e293fee349abedbd6fc2a284fd6c038a2caf13fe3d9a6185f9a7a281377a868f9e19eb31d831ec254737e6b0280447ed1f7996f938d9d8d52c1b528089a1551406da06ea71ad250f7684a6a4606ca9770c71a2f61ef05a3535ecc4e69a0104150c7e2f83816eb83e924465c7c922ec2f1b5bf3fa4454d948f05bb3b13d04f01d1754d0000000000e81184b6e3ead3e025cabae2e8e6774da307d0b9933ef1ff307d5c4e15db14287677bd3c74a6814db278a936cdb2d0d7b9aba99c21978c5c0389010889e63d1148d0305741aedaa9b65b9706002eaa9d62122fbecd252618ee7964821c7d", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 4: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:14 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) wait4(0x0, &(0x7f0000000240), 0x1000000, 0x0) 01:01:14 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) fork() r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 3: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:14 executing program 4: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:14 executing program 5: syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) wait4(0x0, &(0x7f0000000240), 0x1000000, 0x0) 01:01:14 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 3: syz_open_dev$dri(0x0, 0x0, 0x0) 01:01:14 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 5: wait4(0x0, &(0x7f0000000240), 0x1000000, 0x0) 01:01:14 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 3: syz_open_dev$dri(0x0, 0x0, 0x0) 01:01:14 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 5: wait4(0x0, 0x0, 0x1000000, 0x0) 01:01:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 3: syz_open_dev$dri(0x0, 0x0, 0x0) 01:01:14 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:14 executing program 5: wait4(0x0, 0x0, 0x0, 0x0) 01:01:14 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:14 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:14 executing program 5: wait4(0x0, 0x0, 0x0, 0x0) 01:01:15 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) 01:01:15 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:15 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 5: wait4(0x0, 0x0, 0x0, 0x0) 01:01:15 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 1: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:15 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="30944da0e29479bf43fcece380898a9f892e60044a656143da589d419147d8ef46bbf717f59832b2e93249cf5012e89e293fee349abedbd6fc2a284fd6c038a2caf13fe3d9a6185f9a7a281377a868f9e19eb31d831ec254737e6b0280447ed1f7996f938d9d8d52c1b528089a1551406da06ea71ad250f7684a6a4606ca9770c71a2f61ef05a3535ecc4e69a0104150c7e2f83816eb83e924465c7c922ec2f1b5bf3fa4454d948f05bb3b13d04f01d1754d0000000000e81184b6e3ead3e025cabae2e8e6774da307d0b9933ef1ff307d5c4e15db14287677bd3c74a6814db278a936cdb2d0d7b9aba99c21978c5c0389010889e63d1148d0305741aedaa9b65b9706002eaa9d62122fbecd252618ee7964821c7d", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 5: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) 01:01:15 executing program 4: keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 0: ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 01:01:15 executing program 1: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x80) 01:01:15 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 4: keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 0: ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 01:01:15 executing program 1: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = fork() sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000429bd7000fddbdf251200000008000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x4808) wait4(r2, &(0x7f0000000240), 0x1000000, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000380)={0x1, 0xff}, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10804000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x40, 0x36b4, 0x7ff}}}}, 0x30}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008010) prctl$PR_SET_FP_MODE(0x2, 0x3) 01:01:15 executing program 5: prctl$PR_SET_FP_MODE(0x8, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000040)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, 0xfff, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) r0 = fork() r1 = fork() sched_setparam(r1, &(0x7f0000001680)=0x6) getpgrp(r1) r2 = getpgrp(r0) sched_rr_get_interval(r2, &(0x7f0000000100)) syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00', 0xffffffffffffffff) 01:01:15 executing program 2: r0 = syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r2, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r5, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x24, r0, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", "", "", "", ""]}, 0x24}}, 0x8800) 01:01:15 executing program 4: keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 0: ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 01:01:15 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 4: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x7) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000080)) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x40010) 01:01:15 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:15 executing program 2: r0 = syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r2, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r5, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x24, r0, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", "", "", "", ""]}, 0x24}}, 0x8800) 01:01:15 executing program 4: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x7) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000080)) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:15 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:15 executing program 2: r0 = syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r2, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r5, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x24, r0, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", "", "", "", ""]}, 0x24}}, 0x8800) 01:01:15 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x40010) 01:01:15 executing program 4: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:15 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x7) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000080)) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:15 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 01:01:16 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x7) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r4, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) 01:01:16 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:16 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 01:01:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x40010) 01:01:16 executing program 0: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 01:01:16 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x7) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r4, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 01:01:16 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:16 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, r0) 01:01:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', r0) 01:01:16 executing program 0: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 01:01:16 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x7) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) 01:01:16 executing program 0: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 01:01:16 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, r0) 01:01:16 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0xff}, 0x2) 01:01:16 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x7) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) 01:01:16 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r4, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 01:01:16 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) 01:01:16 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, r0) 01:01:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) [ 704.049958] misc userio: Invalid payload size 01:01:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:16 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r4, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 01:01:16 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) 01:01:16 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) 01:01:16 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) [ 704.203814] misc userio: Invalid payload size 01:01:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:16 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) 01:01:16 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) 01:01:16 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r4, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) 01:01:16 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) [ 704.323778] misc userio: Invalid payload size 01:01:16 executing program 4: add_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) 01:01:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:16 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x802, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000380), 0x2) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) 01:01:16 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r4, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 01:01:16 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:16 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) prctl$PR_SET_FP_MODE(0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:16 executing program 4: add_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) 01:01:16 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 01:01:16 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020000005b4be4568d8c562d7a0c4d05dbef1e54c413f334fcda7da8be69383aeb2257149590", @ANYRES16=r4, @ANYBLOB="000226bd7000ffdbdf250100000000000000014100000018001720000008000099d47564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 01:01:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:17 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) 01:01:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000018c0)={0x67446698, 0x1, 0x4, 0x0, 0x203, "cf6b3e967e07f5fa3958f965b2f66ef96de9d08c0a1b895d607726d0cec15eb6eef1551e02f1bd08ad2f68ef43467f93567f4a8f88c513820c2468741690f3e22490331981ccc5eb568a6327fe1ee4fb8a04c7fc47"}, 0x65) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 4: add_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 01:01:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:17 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:01:17 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a859f73c753a09da7e969d5a7e897bd72f0e5eb8b5f0b2f053462e741ec9c", 0x3c, 0xfffffffffffffffd) 01:01:17 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) 01:01:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) 01:01:17 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 01:01:17 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) 01:01:17 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:01:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:17 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 01:01:17 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) 01:01:17 executing program 2: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) 01:01:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 01:01:17 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 01:01:17 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:17 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) 01:01:17 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:17 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x5, &(0x7f0000001880)) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 2: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:17 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:01:17 executing program 2: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:17 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:17 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 01:01:17 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 01:01:17 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:17 executing program 3: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x54}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10000}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c005}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x0, 0x0, 0x25dfdbfc, {{}, {}, {0x8}}}, 0x24}}, 0x40) 01:01:17 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:01:17 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 01:01:17 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) 01:01:18 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:18 executing program 3: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) 01:01:18 executing program 1: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) 01:01:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5c83de5bb3b0ddd04de240468627b5a", 0x1e, 0xfffffffffffffffd) 01:01:18 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:18 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:01:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:18 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:01:18 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) connect$can_bcm(r4, &(0x7f0000000b80)={0x1d, r5}, 0x10) 01:01:18 executing program 3: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', r0) 01:01:18 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) connect$can_bcm(r4, &(0x7f0000000b80)={0x1d, r5}, 0x10) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:18 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="c590d8455608dbf094f68d54ed366d16cc2aa335215c3187710f0054af5987db4fc90b1a9e7e8098b7d3bf50a9b4a40ddad7143dad5678700b71f2e8c9c1273085316109bc5f4efd72163563d1b27c8bc916d6be4401a77cca83a148a875a57cda2b8f54739a195a4ac0cd07a324704dce75dffabaffe797e43710", 0x7b, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$negate(0xd, r2, 0x2, r3) 01:01:18 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000328bd7000fddbdf25010000001e0600000940002000149f699d14b2520018000003ff69623a007269"], 0x30}, 0x1, 0x0, 0x0, 0x48080}, 0x40084) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r3, 0x300, 0x70bd27, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000) 01:01:18 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) connect$can_bcm(r4, &(0x7f0000000b80)={0x1d, r5}, 0x10) 01:01:18 executing program 0: syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) 01:01:18 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) connect$can_bcm(r4, &(0x7f0000000b80)={0x1d, r5}, 0x10) 01:01:18 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="c590d8455608dbf094f68d54ed366d16cc2aa335215c3187710f0054af5987db4fc90b1a9e7e8098b7d3bf50a9b4a40ddad7143dad5678700b71f2e8c9c1273085316109bc5f4efd72163563d1b27c8bc916d6be4401a77cca83a148a875a57cda2b8f54739a195a4ac0cd07a324704dce75dffabaffe797e43710", 0x7b, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$negate(0xd, r2, 0x2, r3) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:18 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) connect$can_bcm(r4, &(0x7f0000000b80)={0x1d, r5}, 0x10) 01:01:18 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000328bd7000fddbdf25010000001e0600000940002000149f699d14b2520018000003ff69623a007269"], 0x30}, 0x1, 0x0, 0x0, 0x48080}, 0x40084) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r3, 0x300, 0x70bd27, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000) 01:01:18 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) connect$can_bcm(r4, &(0x7f0000000b80)={0x1d, r5}, 0x10) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab63b3ec5", 0xf, 0xfffffffffffffffd) 01:01:18 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="c590d8455608dbf094f68d54ed366d16cc2aa335215c3187710f0054af5987db4fc90b1a9e7e8098b7d3bf50a9b4a40ddad7143dad5678700b71f2e8c9c1273085316109bc5f4efd72163563d1b27c8bc916d6be4401a77cca83a148a875a57cda2b8f54739a195a4ac0cd07a324704dce75dffabaffe797e43710", 0x7b, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$negate(0xd, r2, 0x2, r3) 01:01:18 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) read$fb(r4, &(0x7f0000000100)=""/55, 0x37) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 01:01:18 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:18 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000328bd7000fddbdf25010000001e0600000940002000149f699d14b2520018000003ff69623a007269"], 0x30}, 0x1, 0x0, 0x0, 0x48080}, 0x40084) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r3, 0x300, 0x70bd27, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000) 01:01:18 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="c590d8455608dbf094f68d54ed366d16cc2aa335215c3187710f0054af5987db4fc90b1a9e7e8098b7d3bf50a9b4a40ddad7143dad5678700b71f2e8c9c1273085316109bc5f4efd72163563d1b27c8bc916d6be4401a77cca83a148a875a57cda2b8f54739a195a4ac0cd07a324704dce75dffabaffe797e43710", 0x7b, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 01:01:18 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) read$fb(r4, &(0x7f0000000100)=""/55, 0x37) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 01:01:18 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) 01:01:18 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="c590d8455608dbf094f68d54ed366d16cc2aa335215c3187710f0054af5987db4fc90b1a9e7e8098b7d3bf50a9b4a40ddad7143dad5678700b71f2e8c9c1273085316109bc5f4efd72163563d1b27c8bc916d6be4401a77cca83a148a875a57cda2b8f54739a195a4ac0cd07a324704dce75dffabaffe797e43710", 0x7b, 0xfffffffffffffffd) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:18 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000328bd7000fddbdf25010000001e0600000940002000149f699d14b2520018000003ff69623a007269"], 0x30}, 0x1, 0x0, 0x0, 0x48080}, 0x40084) 01:01:18 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) 01:01:18 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) 01:01:18 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) read$fb(r4, &(0x7f0000000100)=""/55, 0x37) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 01:01:18 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:18 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) 01:01:18 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:18 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:18 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) read$fb(r4, &(0x7f0000000100)=""/55, 0x37) 01:01:18 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:18 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:19 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, r0, 0x0) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) 01:01:19 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) read$fb(r4, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) 01:01:19 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 01:01:19 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r4, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:19 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) 01:01:19 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0x0) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f82bab6", 0xc, 0xfffffffffffffffd) 01:01:19 executing program 2: prctl$PR_SET_FP_MODE(0x2, 0x3) keyctl$link(0x8, 0x0, 0x0) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:19 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f", 0x9, 0xfffffffffffffffd) 01:01:19 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 2: keyctl$link(0x8, 0x0, 0x0) 01:01:19 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f", 0x9, 0xfffffffffffffffd) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:19 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:19 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f", 0x9, 0xfffffffffffffffd) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r4, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:19 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:19 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f82ba", 0xb, 0xfffffffffffffffd) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r3, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:19 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:19 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:19 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 01:01:19 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f82ba", 0xb, 0xfffffffffffffffd) 01:01:19 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r3, &(0x7f0000000100)=""/55, 0x37) 01:01:19 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:20 executing program 3: socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:20 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d948f82ba", 0xb, 0xfffffffffffffffd) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r1, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 3: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:20 executing program 4: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000829bd7000bb1b1983eb626bcb05002f000000000008002c00ff0f00000500c0a3279b5671d0b038ba896b11104df335003f00000005003800000000001b9acafda6d3e4c85a244177fb267896cebd6709c817d8711ca460ff55d55c09b62a859214cebc74575cb504712a4b10fe0dd9d9a1cbc7f7a6e4fd00000000c85c8a31adf403bf6fc0c45454a712c515e372b287275bece23cfd4b3348f71ebc77d3b9e31c870394fb7e185f712284daac8b9c6717808f6fb7a96ee90b52b9c441e64a0b6827e782a023422a0c18c58e"], 0x34}, 0x1, 0x0, 0x0, 0x4c0c4}, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r3, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r1, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 3: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:20 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r1, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 3: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) 01:01:20 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r1, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 3: socketpair(0x18, 0x0, 0x100, &(0x7f0000000340)) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:20 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r1, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:20 executing program 3: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:20 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 3: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:20 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:20 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:20 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:20 executing program 3: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:20 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) 01:01:20 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:20 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:20 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 3: socketpair(0x18, 0x0, 0x100, 0x0) 01:01:21 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) 01:01:21 executing program 1: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:21 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:21 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 3: socketpair(0x18, 0x0, 0x100, 0x0) 01:01:21 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:21 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:21 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:21 executing program 0: r0 = syz_open_dev$vcsn(0x0, 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 3: socketpair(0x18, 0x0, 0x100, 0x0) 01:01:21 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:21 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:21 executing program 5: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 0: r0 = syz_open_dev$vcsn(0x0, 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:21 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 0: r0 = syz_open_dev$vcsn(0x0, 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:21 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:21 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:21 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 5: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:21 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 2: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 5: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:21 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:21 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:21 executing program 2: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:21 executing program 5: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:22 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 2: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 0: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:22 executing program 5: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:22 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 0: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:22 executing program 5: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 4: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 0: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:22 executing program 5: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:22 executing program 3: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 4: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:22 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:22 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:22 executing program 3: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 4: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:22 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:22 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:22 executing program 3: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:22 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:22 executing program 0: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:22 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:22 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:23 executing program 5: read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 2: read$fb(0xffffffffffffffff, 0x0, 0x0) 01:01:23 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:23 executing program 5: read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:23 executing program 2: read$fb(0xffffffffffffffff, 0x0, 0x0) 01:01:23 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:01:23 executing program 5: read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:23 executing program 2: read$fb(0xffffffffffffffff, 0x0, 0x0) 01:01:23 executing program 4: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) 01:01:23 executing program 5: r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 2: r0 = syz_open_dev$vcsn(0x0, 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:23 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0xa2ad, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:23 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 5: r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', 0xffffffffffffffff) 01:01:23 executing program 2: r0 = syz_open_dev$vcsn(0x0, 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:23 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:23 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x2, 0x0) prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x40200) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(r1, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 5: r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 2: r0 = syz_open_dev$vcsn(0x0, 0xa2ad, 0x0) read$fb(r0, 0x0, 0x0) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:23 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:23 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, 0x0, 0x0) 01:01:23 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:23 executing program 4: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:23 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) 01:01:23 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, 0x0, 0x0) 01:01:23 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:23 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:01:23 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, 0x0, 0x0) 01:01:24 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:01:24 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:24 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) 01:01:24 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(0xffffffffffffffff, &(0x7f0000000100)=""/55, 0x37) 01:01:24 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(0xffffffffffffffff, 0x0, 0x0) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:01:24 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$fb(r0, 0x0, 0x0) 01:01:24 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:24 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) 01:01:24 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(0xffffffffffffffff, 0x0, 0x0) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:24 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) read$fb(0xffffffffffffffff, 0x0, 0x0) 01:01:24 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 0: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:24 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:24 executing program 0: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:24 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) 01:01:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 4: add_key(0x0, 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 0: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:24 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:24 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:24 executing program 5: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 4: add_key(0x0, 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:24 executing program 0: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:24 executing program 5: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 3: prctl$PR_SET_FP_MODE(0x3, 0x3) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:24 executing program 4: add_key(0x0, 0x0, &(0x7f0000000100)="ab17b6f58d5a7d94", 0x8, 0xfffffffffffffffd) 01:01:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) 01:01:24 executing program 5: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:24 executing program 3: socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:24 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:25 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:25 executing program 3: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 01:01:25 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 3: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:25 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:25 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 3: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:25 executing program 2: socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 3: socketpair(0x18, 0x0, 0x100, &(0x7f0000000340)) 01:01:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:25 executing program 2: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:25 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) 01:01:25 executing program 3: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17b6f5", 0x4, 0xfffffffffffffffd) 01:01:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) 01:01:25 executing program 3: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:25 executing program 2: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) 01:01:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:25 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:25 executing program 2: socketpair(0x0, 0x80000, 0x100, &(0x7f0000000340)) 01:01:25 executing program 3: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 01:01:26 executing program 3: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 2: socketpair(0x18, 0x0, 0x100, &(0x7f0000000340)) 01:01:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab17", 0x2, 0xfffffffffffffffd) 01:01:26 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 2: socketpair(0x18, 0x0, 0x0, &(0x7f0000000340)) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 2: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) 01:01:26 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 2: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 3: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0}, 0x40000160) 01:01:26 executing program 2: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100)="ab", 0x1, 0xfffffffffffffffd) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 3: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:26 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0}, 0x0) 01:01:26 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:26 executing program 3: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:26 executing program 4: add_key(&(0x7f0000000080)='ceph\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) 01:01:27 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0}, 0x0) 01:01:27 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:27 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) 01:01:27 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:27 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x3) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x18, 0x80000, 0x100, &(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000328bd7000fddbdf25010000001e0600000940002000149f699d14b2520018000003ff69623a007269"], 0x30}, 0x1, 0x0, 0x0, 0x48080}, 0x40084) 01:01:27 executing program 3: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r2, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r4) accept$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14) 01:01:27 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:27 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:27 executing program 2: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) recvfrom$ax25(r0, &(0x7f0000000200)=""/243, 0xf3, 0x4121, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:27 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0}, 0x0) 01:01:27 executing program 3: prctl$PR_SET_FP_MODE(0x2, 0x3) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="c590d8455608dbf094f68d54ed366d16cc2aa335215c3187710f0054af5987db4fc90b1a9e7e8098b7d3bf50a9b4a40ddad7143dad5678700b71f2e8c9c1273085316109bc5f4efd72163563d1b27c8bc916d6be4401a77cca83a148a875a57cda2b8f54739a195a4ac0cd07a324704dce75dffabaffe797e43710", 0x7b, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) 01:01:27 executing program 2: ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) prctl$PR_SET_FP_MODE(0x3, 0x0) ioctl$FBIOBLANK(0xffffffffffffffff, 0x4611, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) socket$inet(0x2, 0x80000, 0x9) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x98080) openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x40000, 0x0) 01:01:28 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0}, 0x0) 01:01:28 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) socket$packet(0x11, 0x3, 0x300) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:28 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:28 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) accept$ax25(r0, 0x0, &(0x7f0000000000)) prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f00000001c0), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x5, 0x414, 0x43, {r3, r4/1000+60000}, {0x0, 0x2710}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x3, 0x0, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, "c20f0374f4a506a9"}}, 0x48}, 0x1, 0x0, 0x0, 0x40040}, 0x4000800) 01:01:28 executing program 2: r0 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="6f5ad8f69a6731c7cc2dc8a63f44787d565e4cf9df61ed0f4d20d6788cf8d358b87a809e19459a3bdac50223c8836c61f78802756c54b3a853ba418b2cf601f05f014ec71d37c198", 0x48, r0) 01:01:28 executing program 2: r0 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="6f5ad8f69a6731c7cc2dc8a63f44787d565e4cf9df61ed0f4d20d6788cf8d358b87a809e19459a3bdac50223c8836c61f78802756c54b3a853ba418b2cf601f05f014ec71d37c198", 0x48, r0) 01:01:28 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:28 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000160) 01:01:28 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10000) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:28 executing program 4: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r1, 0x200, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="738d4135f85e"}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x48010}, 0x0) 01:01:28 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) accept$ax25(r0, 0x0, &(0x7f0000000000)) prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f00000001c0), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x5, 0x414, 0x43, {r3, r4/1000+60000}, {0x0, 0x2710}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x3, 0x0, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, "c20f0374f4a506a9"}}, 0x48}, 0x1, 0x0, 0x0, 0x40040}, 0x4000800) 01:01:28 executing program 2: r0 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="6f5ad8f69a6731c7cc2dc8a63f44787d565e4cf9df61ed0f4d20d6788cf8d358b87a809e19459a3bdac50223c8836c61f78802756c54b3a853ba418b2cf601f05f014ec71d37c198", 0x48, r0) 01:01:29 executing program 2: add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) 01:01:29 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) recvmsg$can_bcm(r1, &(0x7f0000000700)={&(0x7f0000000380)=@ethernet, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/12, 0xc}, {&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/126, 0x7e}, {&(0x7f0000000540)=""/175, 0xaf}], 0x4, &(0x7f0000000640)=""/144, 0x90}, 0x2003) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:29 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:29 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 01:01:29 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) accept$ax25(r0, 0x0, &(0x7f0000000000)) prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f00000001c0), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x5, 0x414, 0x43, {r3, r4/1000+60000}, {0x0, 0x2710}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x3, 0x0, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, "c20f0374f4a506a9"}}, 0x48}, 0x1, 0x0, 0x0, 0x40040}, 0x4000800) 01:01:29 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x10, 0x51, 0x0, 0x3, {{0x18, 0x4, 0x0, 0x2, 0x60, 0x67, 0x0, 0xdc, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x34, 0x0, 0x5, [0x8]}, @ssrr={0x89, 0x1b, 0x69, [@remote, @local, @private=0xa010100, @multicast2, @empty, @broadcast]}, @cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @timestamp={0x44, 0xc, 0x85, 0x0, 0x8, [0x5, 0x4]}, @ssrr={0x89, 0x13, 0xc8, [@loopback, @rand_addr=0x64010100, @private=0xa010102, @multicast1]}]}}}}}) 01:01:29 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) recvmsg$can_bcm(r1, &(0x7f0000000700)={&(0x7f0000000380)=@ethernet, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/12, 0xc}, {&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/126, 0x7e}, {&(0x7f0000000540)=""/175, 0xaf}], 0x4, &(0x7f0000000640)=""/144, 0x90}, 0x2003) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:29 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:29 executing program 2: add_key(0x0, &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) 01:01:29 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) accept$ax25(r0, 0x0, &(0x7f0000000000)) prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) clock_gettime(0x0, &(0x7f0000000200)) 01:01:29 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x10, 0x51, 0x0, 0x3, {{0x18, 0x4, 0x0, 0x2, 0x60, 0x67, 0x0, 0xdc, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x34, 0x0, 0x5, [0x8]}, @ssrr={0x89, 0x1b, 0x69, [@remote, @local, @private=0xa010100, @multicast2, @empty, @broadcast]}, @cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @timestamp={0x44, 0xc, 0x85, 0x0, 0x8, [0x5, 0x4]}, @ssrr={0x89, 0x13, 0xc8, [@loopback, @rand_addr=0x64010100, @private=0xa010102, @multicast1]}]}}}}}) 01:01:29 executing program 2: add_key(0x0, &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) 01:01:29 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) recvmsg$can_bcm(r1, &(0x7f0000000700)={&(0x7f0000000380)=@ethernet, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/12, 0xc}, {&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/126, 0x7e}, {&(0x7f0000000540)=""/175, 0xaf}], 0x4, &(0x7f0000000640)=""/144, 0x90}, 0x2003) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:29 executing program 0: ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000180)) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:29 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) accept$ax25(r0, 0x0, &(0x7f0000000000)) prctl$PR_SET_FP_MODE(0x8, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) 01:01:30 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) recvmsg$can_bcm(r1, &(0x7f0000000700)={&(0x7f0000000380)=@ethernet, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/12, 0xc}, {&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/126, 0x7e}, {&(0x7f0000000540)=""/175, 0xaf}], 0x4, &(0x7f0000000640)=""/144, 0x90}, 0x2003) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:30 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 01:01:30 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:30 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x10, 0x51, 0x0, 0x3, {{0x18, 0x4, 0x0, 0x2, 0x60, 0x67, 0x0, 0xdc, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x34, 0x0, 0x5, [0x8]}, @ssrr={0x89, 0x1b, 0x69, [@remote, @local, @private=0xa010100, @multicast2, @empty, @broadcast]}, @cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @timestamp={0x44, 0xc, 0x85, 0x0, 0x8, [0x5, 0x4]}, @ssrr={0x89, 0x13, 0xc8, [@loopback, @rand_addr=0x64010100, @private=0xa010102, @multicast1]}]}}}}}) 01:01:30 executing program 2: add_key(0x0, &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) 01:01:30 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) accept$ax25(r0, 0x0, &(0x7f0000000000)) prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:30 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:30 executing program 2: add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)="58fa47d75dc9b2bb8d6b50c1053ce9437ab0151809789960f641ae0cb261fdd2d37683d4420b2542f3ae9eb3bd8b42214986dec86ded4561f35a3ffb86e462043b68315292f84f4ae34454c37c25eea48e84fa44bf820f61d0bec978070b2d7ddc4eb58dda9afb1281fe6a92818eca8bb5e65c64e08dc30060a4e6d5a8bc5b2b1a80c64ab0e24548703342263b08a319bd834e030c34ec548e505366c3bf6cbd4a6cd398fd4783672f006d2399825e4b2ad783f97b772276c2a0cc9c446852f9bcfc515337c7a46b77ed01b21c", 0xcd, 0xfffffffffffffff8) 01:01:30 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) 01:01:30 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) accept$ax25(r0, 0x0, &(0x7f0000000000)) 01:01:30 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:30 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:30 executing program 2: add_key(&(0x7f0000000100)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 01:01:31 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 01:01:31 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:31 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:31 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) 01:01:31 executing program 2: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) recvmsg$can_bcm(r1, &(0x7f0000000700)={&(0x7f0000000380)=@ethernet, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/12, 0xc}, {&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/126, 0x7e}, {&(0x7f0000000540)=""/175, 0xaf}], 0x4, &(0x7f0000000640)=""/144, 0x90}, 0x2003) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:31 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:31 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:31 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:31 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:31 executing program 2: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r1) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:31 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:31 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) write$snapshot(r0, &(0x7f0000000140)="33314ec5ede1cc579d1d13c9fff9bb88eae2341c2364cd0bcaccc3a4cafc0243b705cabda788cbf5788999b228c52cde4db0db1bb2db504f6a2dc79c50dae51d2faaf6ddd1966a27990d003b6839d4f9", 0x50) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff727}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xfa006048a59fa68d) 01:01:32 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:32 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:32 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x10, 0x51, 0x0, 0x3, {{0x18, 0x4, 0x0, 0x2, 0x60, 0x67, 0x0, 0xdc, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x34, 0x0, 0x5, [0x8]}, @ssrr={0x89, 0x1b, 0x69, [@remote, @local, @private=0xa010100, @multicast2, @empty, @broadcast]}, @cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @timestamp={0x44, 0xc, 0x85, 0x0, 0x8, [0x5, 0x4]}, @ssrr={0x89, 0x13, 0xc8, [@loopback, @rand_addr=0x64010100, @private=0xa010102, @multicast1]}]}}}}}) 01:01:32 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:32 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffffff00}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x40004) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) setsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000003700)=0xffff, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) recvmsg$can_raw(r2, &(0x7f00000036c0)={0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000240)=""/230, 0xe6}, {&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000440)=""/79, 0x4f}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/115, 0x73}, {&(0x7f0000002580)=""/157, 0x9d}], 0x7, &(0x7f00000026c0)=""/4096, 0x1000}, 0x2020) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 01:01:32 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x10, 0x51, 0x0, 0x3, {{0x18, 0x4, 0x0, 0x2, 0x60, 0x67, 0x0, 0xdc, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x34, 0x0, 0x5, [0x8]}, @ssrr={0x89, 0x1b, 0x69, [@remote, @local, @private=0xa010100, @multicast2, @empty, @broadcast]}, @cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @timestamp={0x44, 0xc, 0x85, 0x0, 0x8, [0x5, 0x4]}, @ssrr={0x89, 0x13, 0xc8, [@loopback, @rand_addr=0x64010100, @private=0xa010102, @multicast1]}]}}}}}) 01:01:32 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x40000160) 01:01:32 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffffff00}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x40004) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) setsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000003700)=0xffff, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) recvmsg$can_raw(r2, &(0x7f00000036c0)={0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000240)=""/230, 0xe6}, {&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000440)=""/79, 0x4f}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/115, 0x73}, {&(0x7f0000002580)=""/157, 0x9d}], 0x7, &(0x7f00000026c0)=""/4096, 0x1000}, 0x2020) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 01:01:32 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x10, 0x51, 0x0, 0x3, {{0x18, 0x4, 0x0, 0x2, 0x60, 0x67, 0x0, 0xdc, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x34, 0x0, 0x5, [0x8]}, @ssrr={0x89, 0x1b, 0x69, [@remote, @local, @private=0xa010100, @multicast2, @empty, @broadcast]}, @cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @timestamp={0x44, 0xc, 0x85, 0x0, 0x8, [0x5, 0x4]}, @ssrr={0x89, 0x13, 0xc8, [@loopback, @rand_addr=0x64010100, @private=0xa010102, @multicast1]}]}}}}}) 01:01:32 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:32 executing program 2: prctl$PR_SET_FP_MODE(0x3, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffffff00}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x40004) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r3) setsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000003700)=0xffff, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r2) recvmsg$can_raw(r2, &(0x7f00000036c0)={0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000240)=""/230, 0xe6}, {&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000440)=""/79, 0x4f}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/115, 0x73}, {&(0x7f0000002580)=""/157, 0x9d}], 0x7, &(0x7f00000026c0)=""/4096, 0x1000}, 0x2020) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 01:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:32 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) 01:01:32 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:32 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:32 executing program 2: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x636, 0x102) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x101000, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) prctl$PR_SET_FP_MODE(0x2d, 0x2) 01:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:32 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:32 executing program 2: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:32 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:32 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:32 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:32 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2881, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 01:01:32 executing program 5: socketpair(0x3, 0x3, 0x3, &(0x7f0000000000)) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:33 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:33 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prctl$PR_SET_FP_MODE(0x8, 0x1) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:33 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:33 executing program 5: socketpair(0x0, 0x3, 0x3, &(0x7f0000000000)) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:33 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:33 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:33 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2881, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 01:01:33 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:33 executing program 5: socketpair(0x0, 0x3, 0x3, &(0x7f0000000000)) 01:01:33 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:33 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:33 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:33 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, 0x0, 0x41) 01:01:33 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:33 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa2ad, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:33 executing program 5: socketpair(0x0, 0x3, 0x3, &(0x7f0000000000)) 01:01:33 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2881, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:33 executing program 1: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x6}, 0x2) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:33 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, 0x0, 0x41) 01:01:33 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {&(0x7f0000000800)=""/75, 0x4b}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:33 executing program 5: socketpair(0x3, 0x0, 0x3, &(0x7f0000000000)) 01:01:33 executing program 1: add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:33 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/207, 0xcf}, {&(0x7f0000000140)=""/142, 0x8e}], 0x2}, 0x41) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:33 executing program 5: socketpair(0x3, 0x0, 0x0, &(0x7f0000000000)) 01:01:33 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:33 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, 0x0, 0x41) 01:01:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, 0x0, 0x41) 01:01:33 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x41) 01:01:33 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:33 executing program 5: socketpair(0x3, 0x0, 0x0, 0x0) 01:01:33 executing program 1: add_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:34 executing program 2: getpgrp(0xffffffffffffffff) r0 = fork() sched_setparam(r0, &(0x7f0000001680)=0x6) r1 = fork() sched_setparam(r1, &(0x7f0000001680)=0x6) sched_setparam(r1, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:34 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:34 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 01:01:34 executing program 1: add_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:34 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:34 executing program 5: socketpair(0x3, 0x0, 0x0, 0x0) 01:01:34 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:34 executing program 1: add_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:34 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {&(0x7f0000000a40)=""/219, 0xdb}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:34 executing program 5: socketpair(0x3, 0x0, 0x0, 0x0) 01:01:34 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:34 executing program 1: add_key(&(0x7f0000000100)='rxrpc_s\x00', 0x0, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:34 executing program 2: add_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5e0aec6d731e4a2d79d107a73f3c713592f8f644ebcec4b21f9f3d0e1410dc76eb3d1f74d196f878dc840821609804dd04ff72fa78c2a733f8d264d70324b208ce6bb9fd9b86dca437d96e3d5dfffcd3dc7411e0b4c78cb4644fa5ccbdda9ef270380ec29ad919ee2d85472e19b75ad4a7769ae9efcd656d29955b8effc014493ed0167c5202aebaa160cd090217bcb94ba7b786107c7f8ff0d97100b1075208aefb84bc7182c0c7bc1ed048569d9834f55cd48256a9412888341d51e3cec90224a7a47b7ae6070b435cb7519c83f7bbac9bf3c0f43de27f19b4", 0xda, 0xfffffffffffffffa) 01:01:34 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:35 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 01:01:35 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:35 executing program 1: add_key(&(0x7f0000000100)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) 01:01:35 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:35 executing program 2: getpgrp(0xffffffffffffffff) r0 = fork() sched_setparam(r0, &(0x7f0000001680)=0x6) r1 = fork() sched_setparam(r1, &(0x7f0000001680)=0x6) sched_setparam(r1, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') prctl$PR_SET_FP_MODE(0x8, 0x0) 01:01:35 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:35 executing program 1: prctl$PR_SET_FP_MODE(0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x105401) 01:01:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:35 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:35 executing program 1: prctl$PR_SET_FP_MODE(0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x105401) 01:01:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/67, 0x43}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:35 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 01:01:35 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:35 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x3}, 0x8) 01:01:35 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:35 executing program 1: prctl$PR_SET_FP_MODE(0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x105401) 01:01:36 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x105401) 01:01:36 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:36 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:36 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x3}, 0x8) 01:01:36 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:36 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0x105401) 01:01:36 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0x105401) 01:01:36 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:36 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:36 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:36 executing program 2: prctl$PR_SET_FP_MODE(0x4, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x3}, 0x8) 01:01:36 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0x105401) 01:01:37 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:37 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x3}, 0x8) 01:01:37 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 01:01:37 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) 01:01:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:37 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 01:01:37 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:37 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 01:01:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 4: prctl$PR_SET_FP_MODE(0x8, 0x0) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:37 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/167, 0xa7}, {&(0x7f0000000580)=""/242, 0xf2}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:37 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:37 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:37 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {0x0, 0x0, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:37 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:37 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0xf0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:38 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:38 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:38 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:38 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:38 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {0x0, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:38 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:38 executing program 4: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:38 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:38 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {0x0, 0x0, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:38 executing program 4: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:38 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:38 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 4: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='westwood\x00', 0x9) 01:01:38 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:38 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:38 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:38 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {0x0, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:38 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:39 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x140, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x6, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x7ff, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 01:01:39 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:39 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:39 executing program 4: write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) 01:01:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 4: write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) 01:01:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:39 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 4: write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) 01:01:40 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:40 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, {0x104, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:40 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:40 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000160) 01:01:40 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:40 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000160) 01:01:40 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:40 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:40 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 01:01:40 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:40 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {0x0, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 01:01:40 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x0, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {0x0, 0x0, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:40 executing program 4: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) 01:01:40 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:40 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, 0xb}) 01:01:41 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 01:01:41 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:41 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:41 executing program 4: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) 01:01:41 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:41 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xb}) 01:01:41 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 01:01:41 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {0x0, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:41 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:41 executing program 4: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) 01:01:41 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:41 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8}) 01:01:42 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:42 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:42 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 01:01:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000160) 01:01:42 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {0x0, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:42 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000160) 01:01:42 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:42 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:42 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:42 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:42 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:42 executing program 2: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) 01:01:42 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa06f9c6d8e11e31d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, {}, {0x0, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:42 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000440)=""/64, 0x40}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f00000009c0)=""/11, 0xb}, 0x40000160) 01:01:43 executing program 2: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) 01:01:43 executing program 3: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) 01:01:43 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 2: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) 01:01:43 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:43 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:43 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:43 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:43 executing program 4: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:43 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@hyper}) 01:01:43 executing program 4: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 01:01:43 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:43 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) 01:01:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) 01:01:43 executing program 4: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) 01:01:44 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:01:44 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) prctl$PR_SET_FP_MODE(0x4, 0x0) 01:01:44 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) 01:01:44 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) 01:01:44 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, r0, 0x4}, 0x40) 01:01:44 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) 01:01:44 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) 01:01:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@restrict={0xc}, @ptr={0x10, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/98, 0x33, 0x62, 0x1}, 0x20) 01:01:44 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 2: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fffffffffffffd, 0x4a6900) prctl$PR_SET_FP_MODE(0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 01:01:44 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:01:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 01:01:44 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:01:44 executing program 2: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fffffffffffffd, 0x4a6900) prctl$PR_SET_FP_MODE(0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 01:01:44 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:01:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 01:01:44 executing program 4: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 2: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fffffffffffffd, 0x4a6900) prctl$PR_SET_FP_MODE(0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 01:01:44 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, 0xb}) 01:01:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) 01:01:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 01:01:44 executing program 4: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x101, 0x1}, {0x80000001, 0x2, 0x1}, {0xff}, {0x8, 0x0, 0x1}, 0x3, 0x40, 0xffff, 0x2, 0x0, 0x64, 0x8000, 0x5, 0x79, 0x80000000, 0xffff, 0x2, 0x1, 0x200, 0x1, 0xb}) 01:01:44 executing program 2: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fffffffffffffd, 0x4a6900) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 01:01:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000040)=""/98, 0x0, 0x62, 0x1}, 0x20) 01:01:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) 01:01:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 01:01:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 01:01:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0xffffffe8, 0x9, 0x455d, 0x80, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) 01:01:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 732.763833] BUG: unable to handle kernel paging request at fffffffffffffe90 [ 732.770948] PGD 9e6e067 P4D 9e6e067 PUD 9e70067 PMD 0 [ 732.776210] Oops: 0000 [#1] PREEMPT SMP KASAN [ 732.780696] CPU: 1 PID: 16852 Comm: syz-executor.1 Not tainted 4.19.176-syzkaller #0 [ 732.788551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.797891] RIP: 0010:mm_update_next_owner+0x444/0x650 [ 732.803142] Code: 70 fa ff ff 49 39 c5 0f 84 df fe ff ff e8 e4 9b 29 00 4c 8d 85 20 04 00 00 4c 89 c0 48 c1 e8 03 80 3c 18 00 0f 85 18 01 00 00 <4c> 8b bd 20 04 00 00 4d 39 e7 75 95 e9 12 fd ff ff e8 b6 9b 29 00 [ 732.822074] RSP: 0018:ffff888227c5fd50 EFLAGS: 00010246 [ 732.827423] RAX: 1fffffffffffffd2 RBX: dffffc0000000000 RCX: ffffffff8138c29e [ 732.834679] RDX: 0000000000000000 RSI: ffffffff8138c33c RDI: ffff8880001325d0 [ 732.841931] RBP: fffffffffffffa70 R08: fffffffffffffe90 R09: 0000000000000000 [ 732.849182] R10: 0000000000000005 R11: 0000000000000000 R12: ffff888069762780 [ 732.856428] R13: ffff88808d74c0d0 R14: ffff8880b5344340 R15: 0000000000000000 [ 732.863687] FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 732.871889] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 732.877746] CR2: fffffffffffffe90 CR3: 0000000226f13000 CR4: 00000000001406e0 [ 732.884993] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 732.892253] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 732.899508] Call Trace: [ 732.902093] do_exit+0xae4/0x2be0 [ 732.905534] ? try_to_wake_up+0x733/0x1050 [ 732.909751] ? do_group_exit+0x2a1/0x310 [ 732.913796] ? mm_update_next_owner+0x650/0x650 [ 732.918446] ? lock_downgrade+0x720/0x720 [ 732.922571] ? lock_acquire+0x170/0x3c0 [ 732.926543] ? _raw_spin_unlock_irq+0x24/0x80 [ 732.931017] do_group_exit+0x125/0x310 [ 732.934882] __x64_sys_exit_group+0x3a/0x50 [ 732.939182] do_syscall_64+0xf9/0x620 [ 732.942960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.948140] RIP: 0033:0x465ef9 [ 732.951310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 732.970185] RSP: 002b:00007ffdb40c4308 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 732.977869] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 0000000000465ef9 [ 732.985200] RDX: 000000000041920b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 732.992464] RBP: 0000000000000000 R08: 0000001b2dd201d8 R09: 0000000000000000 [ 733.000672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 733.008111] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffdb40c4400 [ 733.015364] Modules linked in: [ 733.018535] CR2: fffffffffffffe90 [ 733.021978] ---[ end trace 841ebf82b0d4c607 ]--- [ 733.022016] BUG: unable to handle kernel paging request at fffffffffffffe90 [ 733.026735] RIP: 0010:mm_update_next_owner+0x444/0x650 [ 733.033800] PGD 9e6e067 P4D 9e6e067 PUD 9e70067 PMD 0 [ 733.039057] Code: 70 fa ff ff 49 39 c5 0f 84 df fe ff ff e8 e4 9b 29 00 4c 8d 85 20 04 00 00 4c 89 c0 48 c1 e8 03 80 3c 18 00 0f 85 18 01 00 00 <4c> 8b bd 20 04 00 00 4d 39 e7 75 95 e9 12 fd ff ff e8 b6 9b 29 00 [ 733.044308] Oops: 0000 [#2] PREEMPT SMP KASAN [ 733.063185] RSP: 0018:ffff888227c5fd50 EFLAGS: 00010246 [ 733.067670] CPU: 0 PID: 16871 Comm: syz-executor.4 Tainted: G D 4.19.176-syzkaller #0 [ 733.073105] RAX: 1fffffffffffffd2 RBX: dffffc0000000000 RCX: ffffffff8138c29e [ 733.082347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.089605] RDX: 0000000000000000 RSI: ffffffff8138c33c RDI: ffff8880001325d0 [ 733.098943] RIP: 0010:mm_update_next_owner+0x444/0x650 [ 733.106188] RBP: fffffffffffffa70 R08: fffffffffffffe90 R09: 0000000000000000 [ 733.111448] Code: 70 fa ff ff 49 39 c5 0f 84 df fe ff ff e8 e4 9b 29 00 4c 8d 85 20 04 00 00 4c 89 c0 48 c1 e8 03 80 3c 18 00 0f 85 18 01 00 00 <4c> 8b bd 20 04 00 00 4d 39 e7 75 95 e9 12 fd ff ff e8 b6 9b 29 00 [ 733.118693] R10: 0000000000000005 R11: 0000000000000000 R12: ffff888069762780 [ 733.137571] RSP: 0018:ffff888226e4fd50 EFLAGS: 00010246 [ 733.144820] R13: ffff88808d74c0d0 R14: ffff8880b5344340 R15: 0000000000000000 [ 733.150172] RAX: 1fffffffffffffd2 RBX: dffffc0000000000 RCX: ffffffff8138c29e [ 733.157419] FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 733.165018] RDX: 0000000000000000 RSI: ffffffff8138c33c RDI: ffff8880001325d0 [ 733.165029] RBP: fffffffffffffa70 R08: fffffffffffffe90 R09: 0000000000000000 [ 733.173229] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 733.180485] R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880927b9480 [ 733.187733] CR2: fffffffffffffe90 CR3: 0000000226f13000 CR4: 00000000001406e0 [ 733.193598] R13: ffff88808d74c0d0 R14: ffff888083782340 R15: 0000000000000000 [ 733.200864] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 733.208114] FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 733.215369] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 733.222612] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 733.222623] CR2: fffffffffffffe90 CR3: 0000000233186000 CR4: 00000000001406f0 [ 733.230822] Kernel panic - not syncing: Fatal exception [ 733.238081] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 733.263781] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 733.271042] Call Trace: [ 733.273625] do_exit+0xae4/0x2be0 [ 733.277065] ? try_to_wake_up+0x733/0x1050 [ 733.281547] ? do_group_exit+0x2a1/0x310 [ 733.285593] ? mm_update_next_owner+0x650/0x650 [ 733.290261] ? lock_downgrade+0x720/0x720 [ 733.294407] ? lock_acquire+0x170/0x3c0 [ 733.298367] ? _raw_spin_unlock_irq+0x24/0x80 [ 733.302850] do_group_exit+0x125/0x310 [ 733.306724] __x64_sys_exit_group+0x3a/0x50 [ 733.311034] do_syscall_64+0xf9/0x620 [ 733.314823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.319998] RIP: 0033:0x465ef9 [ 733.323177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.342061] RSP: 002b:00007ffd26016df8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 733.349753] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 0000000000465ef9 [ 733.358144] RDX: 000000000041920b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 733.365417] RBP: 0000000000000000 R08: 0000001b2e320138 R09: 0000000000000000 [ 733.372668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 733.379922] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd26016ef0 [ 733.387179] Modules linked in: [ 733.390355] CR2: fffffffffffffe90 [ 733.393794] ---[ end trace 841ebf82b0d4c608 ]--- [ 733.398536] RIP: 0010:mm_update_next_owner+0x444/0x650 [ 733.403895] Code: 70 fa ff ff 49 39 c5 0f 84 df fe ff ff e8 e4 9b 29 00 4c 8d 85 20 04 00 00 4c 89 c0 48 c1 e8 03 80 3c 18 00 0f 85 18 01 00 00 <4c> 8b bd 20 04 00 00 4d 39 e7 75 95 e9 12 fd ff ff e8 b6 9b 29 00 [ 733.422951] RSP: 0018:ffff888227c5fd50 EFLAGS: 00010246 [ 733.428310] RAX: 1fffffffffffffd2 RBX: dffffc0000000000 RCX: ffffffff8138c29e [ 733.435571] RDX: 0000000000000000 RSI: ffffffff8138c33c RDI: ffff8880001325d0 [ 733.442837] RBP: fffffffffffffa70 R08: fffffffffffffe90 R09: 0000000000000000 [ 733.450097] R10: 0000000000000005 R11: 0000000000000000 R12: ffff888069762780 [ 733.457351] R13: ffff88808d74c0d0 R14: ffff8880b5344340 R15: 0000000000000000 [ 733.464611] FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 733.472819] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 733.478684] CR2: fffffffffffffe90 CR3: 0000000233186000 CR4: 00000000001406f0 [ 733.485942] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 733.493198] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 734.366483] Shutting down cpus with NMI [ 734.371251] Kernel Offset: disabled [ 734.374864] Rebooting in 86400 seconds..