a73e87e8ebd48dcb836e7925387d1dfa5d88edeca8c152d5b32f74f162857e28949f3f71ed8f6ba7f2ec83a4bc5fbccf590240b46bad1a1c6c05802fa9401e26c972ac9d03fcc8d57ca5e891e6ab8d091df189a6f869692c536d83432cb20536936460c98708d7fb02070debeabba3d67e709865e54496f7d274eb289030d06031c383d0daeb608df46796d5a41ce369dc93cd874c151f8c6bf43620cdbca48f18799ca5a876f"}, {0xbc, 0x120, 0xa2, "33668f2717596755dadf1f18258b7f06ac3d029b21107ac5b3666d68dc98a9dbf156d4bb6ea4cecc4c2d23dd52b33be628af85eb1ed88e60422671393daeade0bac372a92ac3ee55c98a447ca9a33d650b06ff544dc9ab2a458ef466044e852cdd7617d6df1e452a7aad7ef8465c2df3b816055912a637adf608c8aca9ab0cba232820774cb0d9dd8d044dbc1a9e22dad54ddc6aec66af3b1da63092e661761522c47404990356a929587e9ccccce6"}, {0x38, 0x84, 0x9, "5df6da5fba362327292f7b7514be44f4b82f988e635b32e890e44497c15129018f6487e5e7af430347"}], 0x12c4}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xfffffffffffffc72, 0x0) socketpair(0x23, 0x1, 0x3, &(0x7f00000000c0)) r5 = openat$vcsu(0xffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x109002, 0x0) r6 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r6}, 0xfffffffe) syz_io_uring_submit(r7, 0x0, &(0x7f000000dd00)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r5, 0x0, &(0x7f000000dcc0)={&(0x7f000000d700)=@phonet, 0x80, &(0x7f000000dc80)=[{&(0x7f000000d780)}, {&(0x7f000000d7c0)=""/172, 0xac}, {&(0x7f000000d880)=""/223, 0xdf}, {&(0x7f000000d980)=""/135, 0x87}, {&(0x7f000000da40)=""/78, 0x4e}, {&(0x7f000000dac0)=""/144, 0x90}, {&(0x7f000000db80)=""/228, 0xe4}], 0x7}, 0x0, 0x0, 0x1}, 0x8001) sendmsg$nl_route_sched(r5, &(0x7f000000d5c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f000000d580)={&(0x7f0000000240)=@newtaction={0xd338, 0x30, 0x300, 0xac1, 0x25dfdbfb, {}, [{0x2b4, 0x1, [@m_gact={0x12c, 0x1a, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1d85, 0x2}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7fff, 0x1, 0x2, 0xffff}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xfca, 0x1}}]}, {0xcf, 0x6, "94b65d4634aa92294337ae2f26c0364d9eba4bae38c725393d2aeee192ce4d5ac4e1f62af4a42c5de95afc2cab416a2d643ae0311cfb9ff7621063b1fa69fed9844918b0322815f7effa260b48057ba42a02ad873e25bb622822556258ad18e19b76bb7c799c55a7d3121495846b4594e7fda9814ae639155e3e0dc86146913d1fafe652f125e8404ba10bafc57b046f86e6a64262e9f28cbeaf6c94d268151ada4a31e0f8a1b72ecd3bb9432031b25d08888de20e3a7b76a47f2b6fc83531eefe472da98169f5822f7bd7"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3}}}}, @m_connmark={0x184, 0x19, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x100, 0xda6d, 0x10000000, 0x4, 0x9}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x1f, 0x4, 0xfffff5dd}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0xfffffc00, 0x7, 0x7, 0x1}, 0x3}}]}, {0xff, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, {0xec, 0x1, [@m_sample={0xe8, 0xc, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x3}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x7}]}, {0xaa, 0x6, "769319eac53e3f6ed8bc082019a15d6baaaea77c3a86825cf55e6632798ba7ba2030c0e3c0e099b7b7d03ff891965abf91528634e8f43183ac7d02ba0b9fe2c34fd1b01e55b09cd367d5733ea7aa1375a7916b657ea5148e603fde1a7c5a29f661c25bf22fb58bc458c4f4d2d2c8370d43bb48de04e0471fdfb97c9ffecf44e15fcbf313a261918005507dfa87f676d121cb626258c37ff4cff4bf98187c500ba5859aa161da"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, {0xb5e0, 0x1, [@m_police={0x1a54, 0x1a, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x1a00, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0xff}, @TCA_POLICE_RATE64={0xc, 0x8, 0x7}, @TCA_POLICE_RATE64={0xc, 0x8, 0xffffffffffff2e4a}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}], [@TCA_POLICE_RESULT={0x8, 0x5, 0x100}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8000}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x20000000, 0x8, 0x8, 0x1d, {0xff, 0x1, 0x1a7, 0x2, 0x7, 0x7}, {0x3f, 0x0, 0x2, 0x1f, 0x8, 0x4}, 0x7b, 0x9, 0x1}}, @TCA_POLICE_RATE={0x404, 0x2, [0x8, 0x7, 0x0, 0x3, 0xb1, 0x7, 0xffff0001, 0xe9f, 0x0, 0xc6e, 0x10000, 0xfff, 0x7fffffff, 0x1, 0xea, 0x1, 0x6, 0x0, 0x2, 0x5, 0x1000, 0x537, 0xfff, 0x4, 0x0, 0xfffffffd, 0x4, 0x1, 0x18da4d92, 0x5, 0xf12, 0x0, 0x6, 0x7fffffff, 0x0, 0x74b, 0x0, 0x0, 0x7, 0x80, 0x6, 0x6, 0xcf, 0xd04, 0x1, 0x2, 0x952, 0x3, 0xffffffff, 0x40, 0x5, 0xffffffff, 0x3, 0x4, 0x80, 0x3ff, 0x81, 0x2, 0x27, 0xabf0, 0x1, 0x9d25, 0x7, 0x258, 0x8e, 0x3, 0x2, 0x4, 0x81, 0xfff, 0x10000, 0xf12, 0x8, 0x3, 0x1000, 0x8, 0x9, 0x7, 0xd3c, 0xb50, 0x8000, 0x0, 0x80, 0x7ff, 0x9, 0x8, 0x2424d7d5, 0x2, 0x8a3, 0xf367, 0x0, 0x0, 0x9, 0x3ff, 0x400, 0x200, 0x10000, 0x9, 0x10001, 0x4, 0x1, 0x8, 0x4, 0x1, 0xe759, 0x1, 0xff1, 0x8586, 0x101, 0x8, 0x8, 0x5, 0x0, 0x9, 0x900, 0x1f, 0x80000000, 0xf9, 0x1, 0x1ff, 0xf047, 0x80, 0x5, 0xfffffff7, 0x9, 0xe30, 0x1, 0xca, 0x9, 0x9, 0xfffff000, 0x1, 0x7f, 0x5, 0x2, 0x4, 0x3ff, 0xff, 0x8cb, 0x2, 0x6, 0x7f, 0x7ff, 0x5, 0x1, 0x1e, 0x5, 0x2, 0x164a, 0x4, 0x800, 0x1, 0x7, 0x2, 0x80000000, 0x4, 0x8, 0x800, 0x4, 0x100, 0x8001, 0xe8b9, 0x9, 0x7fffffff, 0x155, 0xf2bc, 0x6, 0x1, 0xb6db, 0x3, 0xffff, 0x20ad, 0x3, 0x80000000, 0xb71, 0xffff, 0x0, 0x15e, 0x6, 0x401, 0x9, 0xffff, 0x3, 0x1, 0xfff, 0x6c27, 0x8d, 0x7, 0x8, 0x8, 0xfffffffc, 0x5, 0xffff0001, 0x6, 0x4, 0x5, 0x1f, 0x8001, 0xfff, 0xffff, 0x1, 0x3, 0x0, 0x7fffffff, 0xffffffff, 0x40, 0x180000, 0x3, 0x8, 0x81, 0x100, 0x7, 0x200, 0x800, 0x9, 0xbec, 0x1, 0x5, 0xfc31, 0x6, 0x81, 0x9, 0x8001, 0x3, 0x1, 0x76eb, 0x4, 0x0, 0x1, 0x1, 0x7e, 0x2, 0x81, 0x4, 0x1, 0x52f, 0x100, 0x4, 0x1ff, 0x80000001, 0x1, 0x5446, 0x10001, 0x7d, 0x3, 0x592, 0x0, 0x4, 0x3ff, 0x925e, 0x3, 0x3f, 0x100, 0x80000001, 0x7ff, 0x35]}], [@TCA_POLICE_RESULT={0x8, 0x5, 0x8000}, @TCA_POLICE_RATE64={0xc, 0x8, 0x3ff}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}, @TCA_POLICE_RATE={0x404, 0x2, [0x80000001, 0x1f, 0x3, 0xffff, 0x64b, 0x1, 0x1, 0x10000, 0x3, 0x8, 0x400, 0x6, 0x7a2d9bdb, 0x4, 0xebd, 0x1f, 0x3, 0x3, 0x3, 0x81, 0x80000001, 0x20, 0x9, 0x4, 0x1, 0x2, 0x81, 0x4, 0x2, 0x2, 0x3f, 0x4, 0x7ff, 0x7, 0x8000, 0x7, 0x8eb, 0x717a, 0x401, 0x7, 0x8, 0x7, 0x400, 0x1, 0x3f, 0x2, 0x0, 0xff, 0x64, 0xfff, 0x8, 0x9, 0x0, 0x8, 0x8, 0x1, 0x8, 0x7, 0x3, 0x3, 0x401, 0x10000, 0x401, 0x1, 0x20000, 0xffff, 0x9, 0x2, 0x1, 0xec, 0x1000000, 0x5, 0x8, 0xffffff00, 0x7, 0x7fff, 0x1, 0x1f, 0x8001, 0x9, 0x3, 0x8, 0x614fa7e8, 0x3, 0x2, 0x7, 0x80, 0xf9, 0x2, 0x0, 0x4, 0x6, 0x7, 0x7, 0x2, 0xe1, 0x0, 0x3, 0x35e, 0x0, 0x31, 0xffffffb0, 0x1f, 0x3, 0x4, 0x7, 0xfffffff9, 0x1, 0x2, 0xe64, 0x8000, 0x0, 0x8, 0x5, 0x6, 0x1ff, 0x4, 0x5, 0x7, 0x4, 0x10000, 0x7, 0x4e0f, 0x4, 0x7ff, 0x0, 0x81, 0xa67, 0x101, 0x2, 0x8000, 0x3, 0x1, 0x9, 0x2, 0xf7, 0x8, 0x794, 0x800, 0x80, 0x0, 0x7, 0x8001, 0x9, 0x4, 0x5, 0xfffffe01, 0xfffffffd, 0x8, 0x8001, 0x10000, 0xffff, 0x8, 0x7fff, 0xd81, 0x100, 0x8, 0x0, 0x8b, 0x3ff, 0x1, 0x7, 0xd0b7, 0x8001, 0xff, 0x7fff, 0x8, 0x6, 0xa841, 0x2, 0xfffffffc, 0x56, 0xba, 0x1, 0x40, 0x9, 0x1f, 0x0, 0xf800, 0xfff, 0x9, 0x1, 0x400000, 0x7, 0x800, 0x7, 0x9, 0x0, 0x6, 0x3ff, 0x5, 0x4, 0x380, 0x3ff, 0x3, 0x5, 0x2, 0x3, 0x35, 0x9, 0x6f3, 0x2, 0x8, 0x8263, 0x1, 0xfff, 0x9, 0x9, 0x8, 0xbddd, 0x3, 0x7, 0x4, 0x9, 0x0, 0x2, 0x7fff, 0x4, 0x6, 0x200, 0xc080, 0x1, 0x3, 0xffffff7f, 0x0, 0x30c9, 0x3a83, 0x0, 0x9, 0x8000, 0xfffffffd, 0x7, 0x7fffffff, 0x3, 0x2, 0xe16f, 0x1, 0xfff, 0x8001, 0xd2, 0x0, 0x3, 0x7fff, 0xfffffffc, 0x800, 0x1, 0x3, 0x8001, 0x8, 0x3, 0x7, 0x3, 0x3, 0x0, 0x0, 0x5a2]}, @TCA_POLICE_RATE={0x404, 0x2, [0x6, 0xffffffff, 0x2, 0x4, 0x9, 0x1, 0x8a1, 0x0, 0xf8a6, 0x5, 0x6, 0x4, 0x3f, 0x6, 0x7, 0x21da, 0x2, 0xb6, 0x9, 0x20, 0x2, 0x1, 0x81, 0x3, 0x2, 0x4, 0x6, 0x2, 0xc5, 0x20, 0x80, 0xfff, 0x5, 0x0, 0x1, 0x1f, 0x1f, 0x3, 0x8000, 0x81, 0x9, 0xc06, 0x30, 0x0, 0xfffffffc, 0x8001, 0x9, 0x2, 0x80, 0x56, 0x9, 0x80, 0x2, 0xce, 0x8, 0x2, 0x81, 0x9, 0x1ff, 0x0, 0x8, 0x1, 0x2, 0x5, 0x7f, 0x7ff, 0x6, 0xdc, 0x101, 0x79, 0xdbf, 0x0, 0x9, 0x400, 0x7fffffff, 0x7, 0x34e, 0xffffffff, 0x7, 0x6, 0x10000, 0x1000, 0x1f, 0x10001, 0x5, 0x8d0, 0x2, 0x3, 0x6, 0x4, 0x5, 0x10000, 0x2, 0x6, 0xff, 0x4, 0x3e8, 0x401, 0x3, 0x4, 0x840, 0x7, 0x1, 0x0, 0xc9, 0x200, 0x3, 0x8, 0x10000, 0x8, 0x6, 0x5, 0xfff, 0x5, 0x7f, 0x0, 0x1, 0x0, 0x1000, 0x4, 0xae9c, 0x8001, 0x3, 0x2, 0x1, 0x8, 0x1, 0x0, 0x56, 0x4, 0x4, 0x1ff, 0x8, 0x3, 0xc24, 0x2, 0x400, 0x9, 0x100, 0x2, 0x5, 0x3, 0x6e32a7aa, 0xbf, 0xfffffff8, 0x2a30, 0x7, 0xffffffc6, 0xe4a60, 0x2, 0x99, 0x8001, 0x8, 0x0, 0x400, 0x442, 0xc3, 0x5738, 0x66, 0x9, 0x5, 0xe6fb, 0x4, 0x674, 0x80000000, 0x9, 0x7fff, 0x0, 0xff, 0x101, 0x7fffffff, 0x0, 0x8aa, 0x6, 0x1, 0x9, 0x6, 0x81, 0x0, 0x101, 0x1, 0x65, 0x5c, 0x1, 0x8, 0xfffffff7, 0xd6, 0x200, 0x6, 0x20, 0x4a94, 0x8, 0x6, 0x101, 0xee, 0x100, 0x80000001, 0x7, 0xff, 0x100, 0x1, 0x2, 0xffffff7f, 0x1000, 0x7, 0x7, 0x9, 0xe5c5, 0xffffea29, 0x4, 0x62e, 0x4, 0x80000000, 0xda, 0x4, 0x7, 0x1, 0x7fff, 0x5ef, 0x1, 0x2, 0x8001, 0x1, 0x80, 0x3, 0x1, 0x800, 0x0, 0x400, 0xf024, 0xfffffff9, 0x1, 0x6e2, 0x1, 0x7, 0x1, 0x80, 0x100, 0x80000001, 0xffffff4f, 0x7fffffff, 0x0, 0x0, 0x20, 0x401, 0x0, 0x6, 0x2, 0x5367, 0xfffffffb, 0x80000001, 0x101, 0x6, 0x6e6c0000, 0x9, 0x7fffffff]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3ff}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x4}], [@TCA_POLICE_RESULT={0x8, 0x5, 0xffff8001}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}], [], [@TCA_POLICE_TBF={0x3c, 0x1, {0xff, 0x20000002, 0x17, 0x8, 0x8000, {0x80, 0x2, 0x5, 0x3, 0x7f, 0x4}, {0x81, 0x0, 0x11, 0x3, 0x1ff, 0xffffffff}, 0x0, 0x1, 0x1}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0x5, 0x10000, 0x9, 0x60000000, {0x4, 0x1, 0xe9, 0x100, 0x201, 0xf390}, {0x6, 0x1, 0x6, 0x0, 0x6, 0x6}, 0xffffffc0, 0x401, 0x1000}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x2, 0x0, 0x6, 0x10001, {0x7, 0x0, 0x1f, 0x3, 0x3f, 0x1}, {0x6, 0x0, 0xf000, 0x8, 0x7, 0xffffff80}, 0x7fff, 0xffffffff, 0x1}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x80, 0x6, 0x800, 0x3, 0x5, 0x0, 0x4, 0xfff, 0x100, 0x101, 0x6, 0x8, 0x90, 0xfd, 0x9, 0x7, 0x7, 0xfffffffc, 0x8d, 0x191c, 0x20, 0x3ff, 0x7ff, 0x1, 0x628d, 0x7fffffff, 0x3c1, 0x72, 0x4000000, 0xd53, 0x10000, 0x3, 0xffffffff, 0x8001, 0x2c62, 0x0, 0x8, 0x1, 0x10001, 0x81, 0x667e, 0x1, 0xf7ee, 0x401, 0x0, 0xfffffffb, 0x0, 0xf5, 0x9, 0x6, 0x2, 0x2, 0x81, 0x80, 0x3, 0x190, 0x8, 0x5, 0x9, 0xfffffffd, 0x3, 0x40, 0x7, 0x9, 0x0, 0x1f0, 0x3, 0xffffffc0, 0x100, 0x4594, 0x8, 0xfffffffc, 0x8001, 0xec1c, 0x5, 0x1f, 0x1000, 0x5, 0x4, 0x7ff, 0x800, 0x1ff, 0x5, 0x7124, 0x40, 0x2, 0x4, 0x273f, 0x5, 0x8, 0x2, 0x8, 0x1, 0x2, 0x9, 0x7f, 0x2827, 0x1, 0x80000001, 0xfff, 0x8, 0x0, 0x7f, 0x6, 0x1, 0x101, 0x8671, 0x1, 0x9, 0x80, 0x9, 0x10000, 0x9b, 0x0, 0x7fffffff, 0x80, 0xffff372f, 0x1308, 0x0, 0x74, 0x3, 0x6, 0xfffff801, 0x8000, 0x2, 0x7f, 0x1, 0x9, 0x8000, 0x5, 0x80000001, 0x7, 0x200, 0x5a0eef0a, 0x6073, 0x5, 0x5aa53a43, 0xa000, 0x5, 0x9, 0x5, 0x6, 0x7, 0x8, 0x400, 0x5, 0x80, 0x9, 0x200, 0x20, 0x2, 0x1ff, 0x84c, 0xffff, 0x7, 0xbf04, 0x8, 0x7fff, 0x3, 0x2, 0x6, 0x8, 0x9, 0xc082, 0x1b, 0x4, 0x9, 0x20, 0x40000000, 0x5, 0x800, 0x7, 0x8, 0x8001, 0x9, 0x100, 0x35e89f8b, 0x3, 0x3, 0xb456, 0x6ade3469, 0x7, 0x3, 0x28b, 0x7, 0x10000, 0xd7, 0x2, 0xffffffc0, 0x100, 0xae6, 0xfffffffe, 0x1, 0x0, 0x34e, 0x2, 0x3f, 0x2, 0xfffffffd, 0x2, 0x4, 0x4, 0x1632, 0x0, 0x2, 0x3a, 0x7ff, 0x9, 0x0, 0x20, 0x20, 0xffffffff, 0x401, 0x3, 0x0, 0x100, 0x4d, 0x5, 0xfffffffd, 0x3, 0x0, 0x6, 0x7fff, 0xed4b, 0x7fff, 0xa39, 0x5d, 0x7, 0x0, 0x6, 0x401, 0x8d56, 0xbd2, 0x1b9, 0x9, 0x1ff, 0xae08fe6, 0x23, 0x3, 0xa0000000, 0x8, 0x5c2, 0x7, 0xff, 0x100, 0x6, 0x7, 0xff, 0x10001, 0x40762bc5, 0xbef, 0x3ff, 0x3, 0x27d, 0x1, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x1ff, 0x4, 0x7f, 0x4, 0x1, 0x75, 0xfffffffd, 0x3, 0x7ff, 0x80000001, 0x8, 0x6, 0x7, 0x9, 0x0, 0x7, 0x8, 0xc77, 0xa2b2, 0x4, 0x7f, 0x100, 0x101, 0x1, 0x8, 0xffffffff, 0x800, 0x6, 0x8000, 0x20, 0x8, 0xdd, 0x6, 0x7, 0x2, 0x5b78, 0x2, 0x4, 0x100, 0xffff8001, 0x7856, 0x7fffffff, 0xfffffff9, 0x3, 0x6, 0x80000000, 0x5, 0x4, 0x9, 0xe000, 0x6, 0x4, 0x2060, 0x0, 0x6b28, 0xc9, 0x6, 0x8f8, 0x20d, 0x7c00000, 0x8000, 0x400, 0x81, 0x0, 0x8, 0x602, 0x8000, 0x5, 0x6, 0x1f, 0x2, 0x7, 0x7, 0x1f, 0x2, 0x2, 0x1b, 0x3f, 0x2, 0x1, 0x3, 0x5, 0x7, 0x4, 0x1, 0x6, 0xa8b, 0x1, 0x81, 0xffffffe1, 0x10000, 0x10001, 0x7f, 0x5, 0x3, 0x7, 0x2, 0x3ff, 0x9, 0x4, 0x401, 0x101, 0x8eb, 0x7ed1, 0x200, 0x5f28, 0x9, 0x0, 0x6, 0x68e, 0x10001, 0x1472a37e, 0x59, 0xbd0a, 0x1f, 0x58bd, 0x2, 0x42, 0x81, 0x80000001, 0x800, 0x1000, 0xffff, 0x2264be64, 0x7, 0x94a, 0x176718bc, 0x7, 0x4, 0x2928, 0x8, 0x10001, 0x1, 0x0, 0x8, 0x7, 0x3f, 0x0, 0x9, 0x189, 0xc19, 0x5, 0x2, 0x2, 0x3, 0x5, 0x9, 0x401, 0x7, 0x4, 0x1, 0x7fffffff, 0x1, 0x5, 0x63, 0x2, 0x5, 0xff, 0x5, 0x1, 0x8, 0x10001, 0x7, 0x12, 0x3e1, 0x2, 0x9, 0x80000000, 0x101, 0x4, 0x8001, 0xa44, 0x0, 0xef70, 0xc44, 0x2, 0xfffffff8, 0x7fff, 0x5, 0x8000, 0x7fff, 0x8, 0x2, 0x4, 0xfff, 0x6, 0x1018, 0x3ff, 0x791, 0x1ff, 0x0, 0x0, 0x4, 0x2, 0x2, 0xe00000, 0x5, 0x4, 0x0, 0x6, 0xfffffff9, 0x8001, 0x0, 0xb2, 0x5, 0x59, 0xffff8000, 0x76, 0x2, 0x4, 0xffffff14, 0x7, 0x81, 0x3, 0x7, 0x6, 0x5f, 0x401, 0x40, 0x1ff, 0x2, 0x0, 0x5, 0x5, 0x7, 0x80000, 0x4, 0xfffff193, 0xda, 0x2, 0x1f, 0x1f, 0x6, 0x80000001, 0x6, 0x8, 0xbca7, 0x7, 0x8, 0x9, 0x9, 0x0, 0xe9f65d1, 0x7, 0x8000, 0x9, 0x800, 0x3, 0x6, 0x7fff, 0x8001, 0x0, 0x1, 0x2, 0x8001]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0x5, 0x8, 0x800, 0xfffffffe, 0x1ff, 0x7ff, 0xe6b, 0x6, 0x4, 0x2, 0x8, 0xc74daa3c, 0xfffffff8, 0xfffffff9, 0x4bf5, 0x3, 0xff, 0x1f, 0x5, 0x8000, 0x13fa, 0x1f, 0x2, 0x4, 0x3, 0x80, 0xfffffffa, 0x5, 0x7, 0xe2aa, 0x20, 0x101, 0xef, 0x0, 0x92, 0x53ce, 0x1, 0x7fff, 0x3, 0x20, 0xd9c, 0x30, 0x4, 0xfffffff7, 0x6, 0x4, 0x6, 0x3, 0x5, 0x100, 0x1, 0x9, 0x4b, 0x0, 0x3, 0x6, 0x5, 0x2, 0x1, 0x2, 0x6e16, 0x401, 0x3, 0xa7, 0x3, 0x0, 0x100, 0x1000, 0x1000, 0x206, 0xcc9, 0x80, 0x3, 0xb1f, 0x80, 0x9, 0x4, 0x1, 0xe07, 0x3, 0x9, 0x7, 0x9, 0x10001, 0x80000001, 0x4, 0xe16, 0xff, 0x8, 0x9, 0x1000, 0x3, 0x10000, 0x9, 0x6904, 0x1, 0x38e4, 0x9, 0x6, 0xdd1, 0x9, 0xffff, 0x1, 0x1, 0x6, 0x2, 0xffff, 0x3, 0x3d7, 0x6, 0xfffffffc, 0x3, 0x5347, 0x0, 0x6, 0x10001, 0x20, 0x68, 0x53, 0x2, 0x7, 0x5, 0x4, 0x8, 0x1, 0x200, 0x1ff, 0x523, 0x3ff, 0x7, 0x200, 0x76be6eae, 0x0, 0x9, 0x7804, 0x100, 0x1, 0x6, 0xfffffff1, 0x2, 0x7, 0x9, 0x8, 0x6, 0x7a4, 0x3, 0x4, 0xfffff26d, 0x7a893f6c, 0xffffffff, 0x9, 0x9, 0x80000001, 0x8000, 0x8, 0x5, 0x5a09102, 0x0, 0x0, 0x1280bada, 0xba45, 0x8, 0xf4, 0x4, 0x5, 0x6, 0xda5c, 0xfff, 0x5, 0x10001, 0x1, 0x3706, 0x6fb1a0b0, 0xac, 0x8, 0x5, 0x9, 0x4, 0x292, 0x6, 0x2, 0xfffffe01, 0x5, 0x8001, 0xffff, 0xffffed69, 0x1, 0x4, 0x5, 0x8, 0x0, 0x20, 0x7, 0x1000, 0x7, 0x1, 0x41, 0x7, 0x1, 0xfff, 0x1, 0x3, 0xff, 0x9, 0x54c, 0x2, 0x0, 0xffffffff, 0x80000000, 0x3, 0xd3, 0xfffffffc, 0x4, 0xbe80000, 0x0, 0x6, 0x6, 0x800, 0x5, 0x18, 0xff, 0x100, 0x8, 0x7, 0xfff, 0x1, 0x8ad, 0xe594, 0x7c5, 0x1000, 0x26, 0x8, 0x5fcb, 0x1, 0x2, 0x314, 0x5, 0x9, 0x751, 0x6, 0x6, 0x6, 0x1e1, 0x0, 0x7e0, 0x1, 0xd, 0x80000001, 0x6, 0x4, 0x0, 0x2, 0x7fffffff, 0x6, 0x8]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0xffffffffffffffff, 0x182, 0x4, 0x400, {0x1, 0x0, 0x7ff, 0x811, 0x2}, {0x4, 0x0, 0x844e, 0x3, 0x401, 0x9}, 0x1, 0x1ff, 0x1ff}}]]}, {0x29, 0x6, "142c2019290994fd72873138c1d91493e2730332bfa6d102ba82e939cd49eb43782830ee99"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_xt={0x10cc, 0x19, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x1038, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0x102a, 0x6, {0x6, 'filter\x00', 0x0, 0xffff, "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"}}]}, {0x6e, 0x6, "8a8f7ec5108f2e1d46b62ec5f2cb5d61309083811a00efa9013ffab091d36ac3d243fefe76a3129c8e5c54249c1cd57d9487c86986c92d83960c480a5ffe57b89632f453a495329b91d299895586d2f1d2df1cf87f402bf4a499d33e1395993950b30b08c59459bf2455"}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_ctinfo={0x150, 0x4, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x64, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x3, 0xfffffffc, 0x10000000, 0x7, 0x7}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x7f}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x5}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0xbe}, @TCA_CTINFO_ACT={0x18, 0x3, {0x10001, 0xf3, 0x20000000, 0x2, 0x3}}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x9}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x2e}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x5dd5}]}, {0xc4, 0x6, "37437cb4ee405b770d1f22554767505daea10a33f63fe7662b6212a69f117dff9961840f21e6eabab5ab47495b4d0516fa83665f1bc008341216bd0199ffd3cd8e56b7f64aa3a67847c10d2b24a282e5f389010708a2daae66773bf9ea0d39f6f77944d42814e4ef37025f1405e797fcd7c2596a222d0b6b364c765b6e236f91767cb75455771b3f165f8ea002016092c046c116aa78527548c88bee2d8bee804ecc88dfb5e1b67a6ece2da9a9ef3d77937f032cc14ec2c8526379713608cf89"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_pedit={0x5920, 0x3, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x580c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xec8, 0x2, {{{0x1, 0x9, 0x0, 0x8}, 0x24, 0x0, [{0x6d, 0x6, 0x756, 0x3, 0x3ff, 0x80000001}, {0x36, 0x9, 0x0, 0x5, 0xfffffeff, 0x8}, {0x2, 0x0, 0xff, 0x20, 0x6, 0x6}, {0x5662ec42, 0x9, 0x9, 0x0, 0xffffffff, 0x632d}, {0x8000, 0xff, 0x3, 0x3f, 0x3, 0x1ff}, {0x1ffc, 0x5, 0x16, 0x20, 0x3, 0x7ec}, {0x1, 0x7, 0x10000, 0x9, 0x9, 0x5}]}, [{0x0, 0x6, 0x29, 0x2593, 0x40}, {0x0, 0x73, 0x400, 0x8, 0x7fffffff, 0x9}, {0x1ff, 0x7fff, 0x1ff, 0xc14a, 0x8, 0xffffff04}, {0x82, 0x7, 0xe150, 0x1, 0x7, 0x6}, {0x80, 0x2, 0x3, 0x400, 0xe20, 0xffff0000}, {0x80, 0x0, 0xc9e1, 0x0, 0x435, 0x7}, {0x6, 0x10001, 0x7, 0xd9f6, 0x9, 0x7}, {0x8, 0x40, 0x7fffffff, 0x7fffffff, 0x4, 0x5}, {0x0, 0x941, 0x6, 0x4, 0x658, 0x3}, {0xffffffff, 0x80000000, 0x7, 0x1, 0x6, 0x81}, {0x80, 0x5, 0x0, 0x400, 0x0, 0x2f}, {0x0, 0x2, 0x0, 0x4, 0xffff, 0x8d4}, {0xc1, 0x4, 0xfffffff7, 0x0, 0xa9d, 0x4}, {0xff, 0x7, 0x1, 0x7, 0x0, 0x8b5}, {0x0, 0x401, 0x8, 0xfff, 0xc000000, 0x4}, {0x100, 0x0, 0x9c8, 0xffff, 0xfffff3bb, 0xd1}, {0x8001, 0x1, 0x9, 0x4, 0x7fff, 0x81}, {0x8001, 0x671eb0b7, 0x80000000, 0x8, 0x8, 0x7fff}, {0x40, 0x8, 0xda, 0x2, 0x4, 0x6}, {0x7, 0x7ff, 0x200, 0x9, 0x81, 0x6}, {0x2, 0x4, 0x2, 0x8, 0x9, 0x7}, {0x20, 0x3, 0x5, 0x8, 0x3, 0x3ff}, {0x5, 0x630, 0x0, 0x3, 0x6, 0x2bd}, {0x5, 0x80000000, 0x4, 0x80, 0x28f0, 0x7}, {0x6, 0xfffffff7, 0x5, 0x4, 0x0, 0x4}, {0x90, 0xefdc, 0x3, 0x3, 0xf30f, 0x5}, {0x5860465f, 0x8000, 0x855d, 0xc8, 0xef87, 0x8000}, {0x81, 0xdc0a, 0x8, 0x4, 0x3f, 0x5629f28a}, {0x2827, 0x1, 0x7ff, 0x2, 0x3e7, 0xa0a3}, {0x0, 0xde1f, 0x0, 0xff, 0x6, 0x3c}, {0x9, 0x37c, 0x2, 0x2, 0x1, 0x1}, {0x400, 0x3, 0x5, 0x8001, 0x5, 0x3178}, {0x0, 0x4, 0x2, 0x200, 0xaaa5, 0x5}, {0x200, 0x7, 0x3, 0xfffffffb, 0x8, 0x3}, {0x62bc, 0x9, 0x1, 0x3f, 0x5, 0x7}, {0x1f, 0x7, 0x8, 0x3ff, 0xfffffffe, 0x3f}, {0x80000001, 0x8, 0x4, 0xfff, 0x3f, 0x1}, {0x9, 0x8, 0x7, 0x20, 0x4, 0x3ff}, {0x100, 0x4, 0x7, 0x1, 0x1, 0x9130}, {0x7, 0x2, 0x101, 0x2e, 0x2, 0x2}, {0x8, 0x1ff, 0xfffffeff, 0x9, 0x8, 0x3}, {0xfff, 0x20, 0xb5, 0x8, 0x1, 0x7}, {0x401, 0x3305a58, 0x850, 0x3, 0xbb, 0x2}, {0x38fe, 0x69157a71, 0x2, 0x7, 0x1}, {0x6, 0x0, 0x4c, 0x200, 0x1ff, 0x7f00}, {0x80000001, 0x8, 0xc5, 0x9, 0x3, 0x4}, {0x4, 0x5, 0x3, 0x1, 0x800, 0x7f}, {0x0, 0x7ff, 0x7fff, 0x1, 0xa3fe, 0x1}, {0x7, 0x5, 0x3f, 0x34c1, 0x2, 0xf0d}, {0x9, 0x1000, 0x800, 0x0, 0x5, 0x9}, {0x5, 0xd0, 0x4, 0x3, 0x3, 0x8}, {0x7ff, 0x6, 0xffffffbf, 0x9, 0xfffffffe, 0x4000000}, {0x9, 0x7, 0x10001, 0x10000, 0x9, 0x9d}, {0x5, 0x90, 0xa35, 0x1ff, 0xf9, 0x3ff}, {0x0, 0xd9f, 0xe62a, 0x2, 0xcd7, 0x400}, {0x5, 0x14d, 0x6d697b2e, 0xfffffffa, 0x7fffffff, 0x1000}, {0x1, 0x7, 0x7, 0x8536, 0x200, 0xffff8000}, {0x8001, 0xffff, 0x8001, 0x0, 0x7, 0x5}, {0x6, 0x6, 0x5, 0x9, 0x26}, {0x36, 0x0, 0x0, 0x9, 0x9, 0x5}, {0x6, 0xfffffff9, 0xc19b, 0x3, 0x7fff, 0x2}, {0x1000, 0x582, 0x8, 0x35d526c3, 0x4, 0x10001}, {0x27, 0x4, 0x47, 0x7ff, 0x7, 0x1}, {0x2, 0x200, 0x4, 0x8, 0xfdf5, 0x3}, {0x8, 0x18b, 0x8, 0x7, 0xff, 0x923e}, {0xa4, 0x4, 0x80, 0x200, 0x2, 0x7}, {0x2, 0x7, 0x6, 0x89dc, 0x3f, 0x10001}, {0x800, 0x0, 0xff000000, 0x5, 0xffffff7f, 0x100}, {0x9, 0x1, 0x8, 0xfffffff8, 0x3, 0x100}, {0xae, 0x920, 0x8, 0x8001, 0x6, 0x1}, {0x80000000, 0x9, 0x2, 0x2, 0x8, 0xa}, {0x7f, 0x1, 0x9, 0x20, 0x8001, 0xfffffff9}, {0x800, 0x9, 0x3, 0x0, 0x3, 0x80000001}, {0x8001, 0xbb, 0x81, 0x81, 0x426, 0xfffffeff}, {0x7, 0xcf, 0x7, 0x4, 0x99b, 0x7f}, {0x1974, 0x74c, 0xfffffffd, 0xcdb7, 0x19cb, 0xffffffff}, {0x7, 0x3, 0x20, 0xb0c5, 0x5, 0x6e6}, {0x1, 0x80, 0x0, 0x2, 0xff, 0x5}, {0x0, 0x8, 0x2, 0x3, 0x2, 0x3}, {0x5, 0x6, 0xffffff01, 0x7, 0x9, 0x1}, {0x68, 0x70b, 0x9, 0x800, 0x7ff, 0x9}, {0xfffffffa, 0xfffffffc, 0x6, 0x1, 0xfffffc00, 0x7f}, {0x6, 0x6, 0x157c, 0x401, 0xed6db37, 0x8}, {0x7, 0x0, 0x80, 0x1f, 0x9, 0x80}, {0xcfad, 0x1, 0x7, 0x12000000, 0xffffffff}, {0x0, 0x80, 0x2, 0x800, 0x80000001, 0x7}, {0x80, 0x1, 0x2, 0x0, 0x81, 0x6}, {0xe989, 0x1, 0x4, 0x100, 0x8, 0x8001}, {0x7, 0x5, 0x1ff, 0x9, 0x3, 0x2}, {0x800, 0x20, 0x1ff, 0x2, 0x5, 0x7}, {0x0, 0x5a5, 0x4, 0x3, 0xb2}, {0x101, 0x1, 0x101, 0x9, 0xffff, 0x9}, {0x1f, 0x81, 0x8, 0x3, 0x4, 0x3d}, {0x5, 0x2, 0xfffffefa, 0x7, 0xa2, 0x7}, {0xffffff00, 0x1, 0xfffffffd, 0x0, 0x8, 0x2}, {0xfffffff8, 0x0, 0x0, 0x7, 0x2, 0x400}, {0x8e, 0xffff0000, 0x180000, 0x6, 0x20, 0x5}, {0x7d2, 0x83, 0xf8b, 0x6, 0x4}, {0x0, 0x7, 0x7, 0xffff22c7, 0x7, 0xffffffff}, {0x92, 0x7, 0xff, 0x39, 0xff, 0x4}, {0xfff, 0x80, 0xffff7fff, 0x250, 0x8, 0xc}, {0x1, 0x3f, 0xe48, 0x800, 0x10001, 0x5}, {0x0, 0xc3, 0x8, 0x1ff, 0x1ff, 0xfffffffa}, {0x800, 0x1bd240, 0x1d7e, 0x0, 0xd96, 0x80000000}, {0x80000001, 0x4b7, 0xb6, 0x800, 0x8e0a, 0x1}, {0xce, 0x4, 0x7ff, 0x7f, 0x2, 0x6}, {0x400, 0x800, 0x8, 0x0, 0x7, 0x23df}, {0xe2, 0x8, 0xffff, 0x1f, 0x2, 0x2000}, {0x571, 0x5d, 0x1000, 0xd84, 0x8, 0x62}, {0x8, 0x3, 0x9, 0x2, 0x7, 0xe0}, {0x6, 0x1, 0x3ff, 0x101, 0x81, 0x3}, {0x7fffffff, 0x800000, 0x9, 0x8, 0x7ff, 0x2f88f503}, {0xffff, 0x10000, 0x1f, 0x80, 0x1000, 0xfff}, {0x2, 0x6, 0x81, 0x0, 0x80000001, 0x1}, {0x6, 0x3, 0xf1, 0x7fffffff, 0x6, 0x3}, {0x5, 0xfffffff8, 0x5, 0x6, 0x7ff, 0x100}, {0x0, 0xa8, 0x532, 0x2, 0x0, 0x3085}, {0x6, 0x100, 0x6afb, 0x20, 0x7fffffff, 0x3}, {0x1, 0x198, 0xffffffff, 0x3, 0x7f, 0x20}, {0x2b, 0x8, 0x6, 0x1000, 0x3ff, 0x1}, {0x1, 0x0, 0x4, 0x9c4, 0x401, 0x32}, {0x8000, 0x96e, 0x1, 0x9, 0x1, 0x10001}, {0x8, 0x8, 0x2, 0x7, 0x54, 0xffffffff}, {0x400, 0x7, 0x1, 0x7, 0x8, 0x65}, {0x400, 0x7, 0x5, 0x7, 0x7, 0xffff}, {0xe093, 0xa0, 0x2, 0x7, 0x6, 0x8}, {0x5, 0x0, 0x9, 0x7, 0x9, 0x9}, {0x7, 0xffffffff, 0xfff, 0x2, 0x10b9d22a, 0x2}], [{0x0, 0x1}, {}, {0x5, 0x1}, {0x1}, {0x5}, {}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x5}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x5, 0x1}, {}, {0x2, 0x1}, {0x1, 0x1}, {0x4}, {}, {0x1, 0x1}, {}, {0x4, 0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x0, 0x1}, {0x1}, {0x2, 0x1}, {}, {0x1}, {0x2, 0x1}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x4}, {0x3}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x1}, {0x5}, {0x5}, {0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x2}, {}, {0x5}, {}, {0x1}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {}, {0x2}, {0x2}, {0x2}, {0x3}, {0x4}, {0x5, 0x1}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {}, {0x4}, {0x2, 0x1}, {0x4, 0x1}, {0x3}, {0x5}, {0x3, 0x1}, {0x2}, {0x4, 0x1}, {0x4}, {0x1, 0x1}, {}, {0x5}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x5}, {0x4, 0x1}, {0x3}, {0x5}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x3, 0x1}, {0x3}, {0x0, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x5}, {0x1}, {0x2}, {0x3}]}}, @TCA_PEDIT_PARMS_EX={0xec8, 0x4, {{{0x96e, 0x0, 0x3, 0x5c06, 0x3}, 0x7f, 0x40, [{0x946a, 0x7d36, 0x8, 0x4, 0x7, 0x7f}, {0x8001, 0x0, 0x3f, 0x6, 0x3c, 0x8}, {0x0, 0x80000000, 0x4, 0x10001, 0x9}, {0x80, 0x7, 0x2, 0x5, 0x101, 0x6}, {0x9, 0x481b, 0x0, 0x2, 0x7}, {0x1, 0xffffffe1, 0x2, 0xc000, 0x0, 0x3}, {0x101, 0xfffffffe, 0x101, 0x2, 0x51eb, 0x6}]}, [{0x1, 0xad, 0xf8000000, 0x0, 0xffff0001, 0x4}, {0xfffffffc, 0x7, 0x4, 0x1b15, 0x2, 0x9}, {0x5, 0x8, 0x2cb, 0x10001, 0x1, 0xb3}, {0x2, 0xff, 0x2, 0xd1, 0x928, 0x4}, {0x8, 0x7fff, 0x7, 0x0, 0x9, 0x4}, {0xfffffffd, 0x1000, 0x1fde, 0x5, 0xdf, 0x5}, {0xfffffffd, 0x2, 0x1f, 0x7ff, 0x9}, {0x3, 0x8, 0x7, 0x2, 0x44c9c4cf}, {0x66b, 0x0, 0x7, 0x7ff, 0x1, 0x2}, {0x3, 0x530b, 0x6, 0x9, 0x9, 0x400}, {0x6, 0x1, 0x1, 0x6, 0x0, 0x6}, {0x3, 0x8, 0x1960, 0x3, 0x3, 0x4}, {0xffffffff, 0xab5a, 0x1, 0x7, 0x7ff, 0x545a7ab}, {0xa76, 0x1, 0x10001, 0x0, 0x7, 0xa3d}, {0x3, 0xf71, 0x7fff, 0x5, 0x1, 0x3f}, {0x7fff, 0x841, 0x6, 0x800, 0x10000, 0x9}, {0x2584, 0x5, 0x14, 0x7, 0x2, 0x8}, {0x6d97, 0x1ff, 0x4, 0x7, 0x80000000, 0x4}, {0x400, 0x9, 0x3, 0x2, 0x0, 0xc}, {0x81, 0x7f, 0x8, 0x6, 0xfffffff9, 0x7}, {0x7, 0xffffffff, 0x2269, 0x706, 0x3, 0x3}, {0x84, 0x7548, 0x6, 0x1, 0x7, 0x9}, {0x8001, 0x7, 0x0, 0x10001, 0x6}, {0xfffff001, 0x3, 0x9, 0xf2a, 0xcd39, 0x7}, {0x1000, 0x800, 0x6783, 0xfff, 0xffffffff, 0x3}, {0xfffffffb, 0x2474, 0x74d4, 0x6, 0x8e61, 0x9}, {0x4, 0x1, 0xffffffff, 0x29a51860, 0x80000, 0x1}, {0x3, 0x200, 0x400, 0x3, 0x9, 0xfffffff8}, {0x2, 0x2f5c, 0x0, 0x5, 0x4, 0x6ba}, {0x8, 0x3f, 0x7, 0x6, 0xc1, 0x8b14}, {0x6, 0x7fffffff, 0xfff, 0x9, 0x2, 0x4}, {0x80000001, 0x427b, 0x2, 0xd8f, 0xfff, 0x10000}, {0x8, 0xf3f, 0x10000, 0x0, 0x3, 0x81}, {0xffffff9a, 0x8, 0x5, 0x7ff, 0x6, 0x1}, {0x100, 0x3, 0x608f, 0x5, 0x27, 0x1}, {0x9, 0x5, 0x4, 0x3, 0x4}, {0xfffffff9, 0x3, 0x7fffffff, 0x0, 0xfffffbff, 0xff}, {0x3, 0xffffffff, 0x5, 0x19ef800, 0x7, 0xfffffffa}, {0x9, 0x4, 0x1, 0x6, 0x9, 0x2}, {0x1c3, 0x25da, 0x40, 0xd3c, 0x0, 0xc000}, {0x3f, 0x0, 0x401, 0xc0a4, 0x80, 0x4}, {0x7, 0x0, 0x1, 0x9, 0x98c, 0x3}, {0x5, 0x1ff, 0x4, 0x3f, 0xcfc0, 0x200}, {0x5, 0x28, 0x50, 0x98e, 0x7, 0xc184}, {0x9, 0x1f, 0x1f, 0x0, 0x80, 0x5}, {0x5, 0x6, 0x1000, 0x80000001, 0x3ff}, {0x8, 0x0, 0x1, 0x0, 0x4, 0x8000}, {0xc5d1, 0x1, 0x10001, 0x1, 0x1f}, {0x2f03, 0x8000, 0x40000000, 0x9, 0x3f, 0x4d52}, {0x81, 0x7, 0x8, 0x4, 0x9d}, {0x3, 0x1f, 0x2, 0x10001, 0xb}, {0x40, 0x8000, 0x9, 0x6, 0x8, 0x63}, {0x80, 0x1, 0x2b, 0x95c1, 0x9, 0x3b}, {0x2f2, 0x200, 0x7f, 0x175d, 0x1, 0x9}, {0x7ff, 0x7fffffff, 0x307, 0x13b, 0x3, 0x6}, {0xff, 0x10000, 0xfff, 0x1, 0x20000, 0x1}, {0x1, 0x8, 0x5, 0x8d, 0x1, 0x3}, {0x1, 0x7fffffff, 0x86f8, 0x7f, 0x4, 0x5}, {0x7, 0xffffffff, 0xffffff81, 0x3b, 0x7ff, 0x5}, {0x10001, 0x7, 0x6, 0x6, 0x4, 0x1}, {0x8, 0x8, 0x8, 0x0, 0x7, 0xfffffff8}, {0x1, 0x5, 0x8, 0x4725, 0x7, 0x410}, {0x3ff, 0x6, 0x1, 0x8, 0x3, 0x57}, {0x7, 0x5, 0xfffffffc, 0x9, 0x8}, {0xffffffff, 0x4, 0x9, 0x0, 0x1f, 0xfffffffd}, {0x7, 0xffffffff, 0x40, 0xffff, 0x4, 0xc4}, {0x0, 0xfee, 0x3, 0x0, 0x80000001, 0x8001}, {0x8, 0x8000, 0x8, 0x1000, 0x3f}, {0x2, 0x1, 0x81, 0x0, 0x8, 0x1f}, {0x4, 0x8, 0x6, 0x0, 0x6, 0x5459a61}, {0x5, 0x5, 0x249ad892, 0x80000001, 0x7, 0x7ff}, {0x6, 0x7ff, 0xfffffff8, 0x1000, 0x3, 0x9}, {0xb801, 0x9, 0x81, 0x7, 0xa, 0xfff}, {0x6, 0x2, 0x8, 0x4, 0x400, 0x2}, {0x2, 0x5, 0xad50f181, 0xfffffffb, 0x7, 0x1}, {0x0, 0x9, 0x8de6, 0x101, 0x4, 0x80000001}, {0x7, 0x5, 0x80000001, 0x1f, 0x10000, 0xfffffeff}, {0x800000, 0x6, 0x7, 0x3, 0x100, 0x1f}, {0xdcf, 0x8, 0x62, 0x9, 0xffffff81, 0x5}, {0x1f, 0xfffffffc, 0x7, 0xdab, 0x6, 0x855}, {0x20, 0x7, 0x7ff, 0x0, 0x6, 0x80000000}, {0x2, 0x800, 0x6, 0xb7, 0x8000, 0x81}, {0x0, 0x25a2, 0x1ce0bafb, 0xf6, 0x4, 0x4}, {0x1ff, 0x2, 0x1, 0x6, 0x0, 0x7ff}, {0x1, 0x1, 0xb900000, 0x8c, 0x100, 0x79c}, {0x101, 0x1ae, 0x4, 0x2, 0x20, 0xc1c}, {0xba2, 0xfffffff8, 0x4, 0x0, 0x200, 0x2}, {0x42ebaa43, 0x0, 0x8, 0x6, 0x3, 0x80000000}, {0x2, 0x5, 0x9, 0x7, 0x7, 0x8001}, {0x9, 0x80000000, 0x94, 0x0, 0x9, 0xfc4c}, {0x4, 0x5, 0xffff8001, 0x10002, 0x1ff, 0xffffffff}, {0x8, 0x9, 0x2, 0x214f72e8, 0xda8}, {0x6, 0x4, 0x1, 0x4, 0x1, 0x20}, {0x400, 0x3, 0x390, 0x3, 0xfffffffa, 0x200}, {0x6, 0x1f, 0x3f, 0x1, 0x0, 0x3}, {0xeb0a, 0x7, 0x7, 0x3, 0x4, 0x3}, {0x7ff, 0x3f, 0x4, 0x6}, {0xc5b, 0x48f, 0x8, 0xfffffffe, 0x6, 0x81}, {0x9, 0x40, 0x5306, 0x0, 0x5, 0x7fffffff}, {0x7, 0x27, 0x4, 0x2, 0x10000, 0x5}, {0xff, 0x4, 0x8, 0x7a, 0x9, 0x8}, {0x7, 0x7, 0x6, 0x4, 0x8, 0x2}, {0x7f, 0x400, 0x8, 0x7f, 0xffffffff, 0x5}, {0x4085, 0x3, 0xc9be, 0x9, 0xffff, 0x9}, {0x2, 0x9, 0x8, 0x5, 0x200, 0x9d}, {0x3, 0x3, 0x0, 0x9, 0x1000, 0x3}, {0x6c2f, 0x80, 0x4, 0x3, 0x4, 0x1}, {0x9, 0x5, 0x800, 0x5, 0x7, 0x8}, {0x1, 0xa7ce, 0x3, 0x9, 0x748, 0xfffffffc}, {0x50dbb833, 0x0, 0x7, 0x1f, 0x5d5, 0x80}, {0x259, 0x7, 0x8e8, 0xfffffe00, 0x1000, 0x6}, {0xd85, 0x6, 0x1, 0x7, 0x7f, 0x3f}, {0x7fff, 0x10001, 0xfffffffa, 0x9, 0xffffff81, 0x20}, {0x2, 0x7f, 0x34, 0xa8cd, 0x8, 0x1}, {0x0, 0xf9, 0x3, 0x763, 0x4, 0x3}, {0x81, 0x80000001, 0x8, 0x8, 0x0, 0x9}, {0x10001, 0xf0a, 0x100, 0x80000000, 0x9, 0x1}, {0x6, 0x7ff, 0x81, 0x3, 0x5, 0x69b}, {0x800000, 0x1, 0x40a, 0x8, 0x1a, 0xaa}, {0x2, 0x5, 0x8, 0x8001, 0xfa, 0xfffffff7}, {0x8001, 0x3, 0x1, 0x6, 0x0, 0xfffffffc}, {0x7, 0x2, 0x3, 0x5, 0x8}, {0xffffffff, 0x81, 0x7fff, 0x20, 0x8001, 0x1}, {0xbaf182d, 0xfffffffe, 0x2, 0x1000, 0x1, 0x3}, {0x200, 0x1, 0x9, 0x10000, 0x8, 0x7}, {0xfffffff8, 0x7, 0x9, 0x3, 0xd, 0x8001}, {0x5, 0x3, 0x81, 0x1, 0x8, 0x400}, {0x6, 0x1ad8, 0x7, 0x1f, 0x2df, 0x2}], [{}, {0x5, 0x1}, {0x4, 0x1}, {0xe, 0x1}, {0x1, 0x1}, {0x2}, {}, {0x5, 0x1}, {0x4}, {0x3}, {0x4, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {}, {0x2, 0x1}, {0x1af21fbd3f7fbec5, 0x1}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {}, {0x3}, {0x2, 0x1}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x4}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x2, 0x1}, {0x1}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x5}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x5}, {0x1}, {0x4}, {0x4, 0x1}, {0x58f59382b74d139c, 0x1}, {0x5}, {0x5}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x4}, {0x5, 0x1}, {0x3}, {0x1}, {0x5, 0x1}, {0x3}, {0x2}, {0x2}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x1}, {0x2}, {0x4, 0x1}, {0x6, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {0x1}, {0x4}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x3, 0x1}, {0x2, 0x1}, {}, {0x5}, {0x3}, {0x1, 0xb7b0bdde91bfa4a9}, {0x1, 0x1}, {0x1}, {}, {0x4, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x1}, {0x0, 0x1}, {0x3}, {0x1}, {0x3}, {0x4, 0x1}, {0x2, 0x1}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xec8, 0x4, {{{0x4, 0xf99a, 0x5, 0x3, 0x5}, 0xab, 0x62, [{0xffff, 0x80000001, 0xd375, 0xfffffff7, 0x2000, 0x1000}, {0x2, 0x3, 0x802, 0xffffff12, 0x4, 0xbc8}, {0x80, 0x2, 0xfffffe01, 0x2, 0x2, 0x7fff}, {0x3, 0x3, 0x0, 0x10000, 0x0, 0x9}, {0x800, 0xbe36, 0x7ff, 0x7, 0x0, 0xffffff7f}, {0x6bd0000, 0x7, 0x3, 0x61, 0x3, 0x6}, {0x1, 0x1, 0x4, 0x3, 0x1, 0x100}]}, [{0xa3f, 0x4, 0x80000001, 0x895, 0xfffffffd, 0x7}, {0x1, 0x6, 0x4, 0x7, 0x5, 0x1}, {0x6, 0xbde, 0x2, 0x10001, 0x3, 0xfffffffd}, {0x3, 0x0, 0x6, 0x2, 0x6, 0x6}, {0x30000000, 0xa, 0x9, 0x7ff, 0xec74, 0x8}, {0x0, 0x7, 0xb243, 0x7, 0xfffffffc, 0xffe}, {0x5, 0xfffffff7, 0x1, 0x10000, 0xac4a, 0x3ff}, {0x4, 0x7, 0x3f, 0x8001, 0x3, 0xff}, {0x534e, 0x0, 0x8, 0x8, 0x1, 0x89}, {0x800, 0x1, 0x7, 0x6, 0x103b, 0x9}, {0x3, 0x4, 0x6, 0x7ff, 0x5, 0x8}, {0x80000000, 0x8f4, 0x3, 0x1, 0xffffffff, 0x1ff}, {0xd75, 0x3, 0xfffffe01, 0x9, 0x81, 0xffffffff}, {0x3, 0x3ff, 0x7ff, 0xfffffe00, 0x10000, 0x8}, {0xffff, 0x5d6d, 0x1, 0xbf, 0x7, 0x5}, {0x8, 0x4, 0xfffffff8, 0x9, 0x90ea, 0x7a}, {0x9, 0x7, 0x1, 0x4, 0x2, 0x8000}, {0x642, 0xe20b, 0x800, 0x8, 0x2ee3, 0x5}, {0x7, 0x1, 0x1, 0x7fff, 0x67, 0x8}, {0x5, 0x4, 0x3f, 0x5, 0xfffff824, 0x8}, {0xc4, 0x100, 0xd2, 0x8001, 0x6}, {0x0, 0x9, 0x0, 0x2af, 0x6, 0x9}, {0x3, 0x2, 0x3e42, 0x141, 0x3, 0x7}, {0x40, 0x20, 0xff, 0x3, 0x1, 0x10000}, {0x7, 0x1, 0x6, 0xfffffffa, 0x7, 0x7}, {0x4, 0x0, 0x7ff, 0x4, 0x1, 0x4}, {0x10000, 0xffff, 0x8, 0x0, 0x5, 0x4}, {0x2, 0x40000, 0x2, 0x0, 0x3ff, 0x8001}, {0x7fffffff, 0xc01, 0x7, 0x3ff, 0x4, 0xff}, {0x3f, 0x7fff, 0xffff, 0x7fffffff, 0x7fff, 0x200}, {0x7, 0x1000, 0x20, 0x0, 0x5, 0x3}, {0xfffffffe, 0x0, 0x6, 0x8001, 0x5, 0x1ff}, {0x0, 0x7, 0x80000001, 0x3be6, 0x0, 0x4}, {0x4, 0x6, 0x4, 0x8, 0x7, 0x2}, {0x9c, 0xfffffffa, 0x7, 0x3, 0x2, 0x3}, {0xffffffff, 0x0, 0x9, 0xfffffff8, 0x0, 0x8}, {0x0, 0x3ff, 0x5, 0x9c7, 0x7ff, 0x8}, {0x9, 0x0, 0x200000, 0xfc0, 0x6, 0x101}, {0x3f, 0x1f, 0x3f, 0xa3, 0xc4a, 0x89}, {0x0, 0x2, 0x20, 0x9, 0x3, 0x7ff}, {0xffffffff, 0x112, 0x9, 0x3, 0x80, 0x101}, {0xdf2, 0x81, 0x2, 0x3, 0x0, 0x8}, {0x0, 0x6, 0x8, 0x8, 0x1}, {0x7, 0x0, 0xdc, 0x20, 0x7, 0x2}, {0x101, 0x0, 0x0, 0x7, 0x3ff, 0xfffffff7}, {0xfffffffb, 0x7, 0x0, 0x5, 0x7, 0xfffffffc}, {0x1000, 0x9, 0x2, 0x1, 0x1, 0x4}, {0x3ff, 0x0, 0x9, 0x4, 0x2, 0x3}, {0xfffffffe, 0x0, 0x6, 0x52, 0xb0eb, 0xfffffffe}, {0x1f, 0x200, 0xfffffffb, 0x1f, 0x8001, 0x79a}, {0x7, 0x1, 0x7fff, 0x7, 0x5, 0x80000001}, {0x2, 0x5, 0x78, 0x2, 0x200, 0x4}, {0x5, 0x9, 0x101, 0x1, 0x6, 0x8}, {0x1, 0x40, 0x5, 0x0, 0x400, 0x270a}, {0x2, 0x1, 0x7f, 0x4, 0xfffffffc, 0x1}, {0x0, 0x8, 0x3e8, 0x4, 0x2, 0x6}, {0x9, 0x10001, 0x9b5, 0xffffffe1, 0x8001, 0x8001}, {0x1, 0x80, 0x3ff, 0x9, 0x1, 0x1f}, {0x17a8, 0x4690, 0x5, 0x7, 0x4, 0x3}, {0x7, 0x2, 0xe1a0, 0x5, 0x9, 0x8}, {0x80000000, 0x1, 0x3, 0x7995e51d, 0x6, 0x3ff}, {0x100, 0x81, 0x200, 0x1f, 0x2, 0xffffffff}, {0xa99, 0xdc1, 0x1, 0x80000000, 0x54a, 0x6}, {0x8eb3, 0x2e7, 0x48, 0xf3, 0x80000000, 0x61b}, {0xfffffffd, 0x3, 0x0, 0x170, 0x20, 0x3}, {0x80000000, 0x80, 0x3, 0x0, 0xfffffff9, 0x4}, {0x2, 0x8, 0xffff151e, 0x9, 0x7f, 0x7c}, {0x6, 0x9, 0x8, 0x80000001, 0x1, 0x80}, {0x7, 0x8, 0x0, 0xb27, 0x5, 0x2}, {0x7, 0x3, 0x6e59, 0x5, 0x8, 0x6}, {0x0, 0x3, 0x9, 0xa098, 0xfffffffd, 0x6}, {0x5, 0xffffff58, 0xfffffffd, 0x8000, 0xf8a7}, {0x3f, 0x3, 0x1000, 0x7ff, 0x80, 0x729c}, {0x7, 0x0, 0xfffffffc, 0x4, 0xc6a, 0x4}, {0x9, 0x80, 0x74, 0x9, 0x4, 0xf29}, {0x3f, 0x6, 0x1ff, 0x5, 0x7fffffff, 0x6}, {0x0, 0x0, 0x5, 0x6fae, 0x6, 0x10000}, {0x1f, 0x1, 0x2, 0x7, 0x7, 0x30}, {0x2, 0x400, 0x3, 0x101, 0x5, 0x1}, {0x80000001, 0x200, 0x4, 0xff, 0xfffffc00, 0x80000001}, {0x11, 0x7, 0x7, 0x400, 0x3f, 0x9}, {0x2, 0x2, 0x4, 0x7, 0x92c1f000, 0x6}, {0xba99fa3, 0x0, 0xa91, 0x10001, 0x3, 0x180}, {0x7fff, 0x2, 0x17a904dc, 0xfffffff9, 0x9, 0xb40}, {0x10001, 0x3, 0x5, 0x4, 0x80000001, 0x4}, {0x7, 0x25, 0x248b4849, 0x10000, 0xffffffe1, 0x3}, {0x2, 0x1000, 0x8000, 0x2, 0x8}, {0xfff80000, 0x101, 0x6, 0x8, 0x3, 0x6}, {0x9, 0x4, 0x6, 0x8, 0x258, 0xb28}, {0x6, 0x401, 0x6, 0xfff, 0x3, 0xfff}, {0x8, 0xffff, 0x3, 0x3, 0x200, 0x800}, {0x7, 0x7, 0xc03e, 0x8, 0x0, 0x2e000000}, {0x1f, 0x101, 0x400, 0x6, 0x80000000, 0xfffff5d8}, {0x5, 0x5, 0xfff, 0x2, 0x2, 0x8f4}, {0x1, 0x4, 0xfffffeff, 0x1, 0x6, 0x3}, {0x0, 0xfff, 0x0, 0x10, 0xfffffffa, 0x10001}, {0x1, 0x0, 0x8001, 0x5, 0x80000000, 0xc91}, {0x6, 0x7, 0x0, 0x0, 0x3, 0x853}, {0x101, 0x5250, 0x9f6, 0x8000, 0x2, 0x8}, {0x10001, 0x80000, 0x2, 0x9, 0x5, 0x7ff}, {0x40, 0xffff1707, 0x20300, 0x2, 0x4, 0x3}, {0xffffff01, 0x1, 0x3, 0x1, 0x7, 0x40}, {0x80, 0x4, 0x6, 0x37da, 0xffff, 0xf857}, {0xa56, 0x0, 0x100, 0x0, 0x9, 0x5}, {0x5, 0x3, 0x9e, 0x6, 0x7bd3, 0x7fe00000}, {0x100, 0xb94, 0x5000, 0x7, 0x9, 0xffffff00}, {0x10000, 0x9, 0x1, 0x5, 0x1, 0x1000000}, {0x80, 0x1, 0x1000, 0x3}, {0x7b03, 0x0, 0xfffffff9, 0x4, 0x7f, 0x1000}, {0x5, 0xff, 0x0, 0x400, 0x8d, 0x2}, {0x80000001, 0x200, 0x4, 0x1f0, 0xff, 0x7}, {0x1, 0xe2, 0x2, 0x2, 0xffffffff, 0x400}, {0xdfc3, 0xfffffff8, 0x0, 0x9, 0x9, 0x3}, {0x7, 0xff, 0xe71, 0x7, 0x1c40, 0x6}, {0x100, 0xfffffff8, 0x401, 0x0, 0x0, 0x4}, {0x5, 0x7, 0x10001, 0x401, 0x1, 0xa7a}, {0x200, 0xfff, 0x7345, 0x1, 0x7, 0x101}, {0xfff, 0xffffffff, 0x6, 0x101, 0x48, 0x9}, {0x5, 0x64, 0xc01, 0x1ff, 0x0, 0x2}, {0xb59, 0x7, 0x0, 0x16f0, 0x2, 0x9}, {0xfffffff9, 0x8, 0xc1ef, 0x6, 0x5, 0x7}, {0x5, 0x7, 0x4, 0x8, 0xfff}, {0x6, 0x6, 0x80000000, 0x80, 0x1000, 0x400}, {0x800, 0x8604, 0x7, 0x1, 0x3f, 0x2}, {0x3, 0x76cd, 0x26, 0x8, 0xfffffe00, 0x1bee}, {0x7, 0x0, 0xd92, 0x9, 0xfffffc01, 0x80000000}, {0xffff0657, 0x200, 0x1, 0x3, 0x8, 0x6}, {0x3, 0x401, 0x1, 0x3ff, 0x3, 0xe940}], [{0x3}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5}, {0x1}, {0x4}, {0x1, 0x1}, {0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x4}, {0x5}, {0x3}, {0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x4}, {0x2}, {0x5}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x1}, {0x5}, {0x5, 0x1}, {0x5}, {0x2}, {0x2}, {0x0, 0x1}, {0x4}, {0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x7}, {0x2, 0x3}, {0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x6}, {0x5, 0x1}, {0x1}, {0x3}, {0x2, 0x1}, {0x5}, {0x2}, {0x4, 0x1}, {0x5}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x4}, {0x3}, {0x4}, {0x7}, {0x4}, {0x2}, {}, {}, {}, {0x5}, {0x5, 0x2}, {0x1}, {}, {}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x3}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x2}, {0x2}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {}, {0x4}, {0x1}, {0x7, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x3}, {0x1}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {0x2}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x3}, {}, {0x0, 0x1}, {0x1}, {0x2}, {0x2}], 0x8}}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x2, 0x9, 0xffffffffffffffff, 0x2, 0x67}, 0x0, 0x3f, [{0x10001, 0x8, 0x0, 0x3f, 0x8a27, 0x9}, {0xa2, 0x6, 0x7f, 0x1, 0x7, 0x80}, {0x2, 0xfc91, 0x7, 0xfffffffa, 0x1}]}, [{0x6, 0x6, 0x6, 0x96f3, 0x8, 0x3}, {0x10001, 0x4, 0xffffffff, 0x5bc3, 0x8, 0x20}, {0x5, 0x4, 0x1, 0x8, 0xed, 0x4a5}, {0x1, 0x1, 0x3ff, 0x1000, 0x2, 0x3}, {0x9d4, 0x5, 0xffffffe1, 0x8, 0xff, 0x2}, {0xfffffffa, 0xfffffff8, 0x9, 0x2, 0x0, 0x21}, {0x8, 0x1780c4ec, 0x2, 0x8, 0x2, 0x4d}, {0x3f, 0x5b, 0x6, 0x0, 0x4, 0x4}, {0xe7, 0x10001, 0x8, 0x4, 0x53fb, 0x2}, {0x20, 0x6, 0x8, 0x6, 0x3, 0x7}, {0xff1, 0x1, 0x446, 0x0, 0x5, 0x26}, {0x80000000, 0xf4e2, 0xffff8000, 0x6, 0x81, 0x8}, {0x3ff, 0x2, 0x2, 0x3, 0x7ff, 0x4}, {0x2, 0x5, 0x5, 0x200, 0x7, 0x8}, {0x1, 0x41, 0x81, 0x389c, 0x4, 0xee}, {0x5, 0x9, 0x8, 0x8, 0x847b, 0x7}, {0x8, 0x7f, 0x200, 0x81, 0x1ff, 0x7}, {0x5, 0x0, 0x9, 0x8, 0x0, 0x4}, {0x0, 0x0, 0x400, 0x3, 0x4065, 0x9}, {0x5c1, 0x5, 0x1, 0xffff, 0x5, 0x5}, {0x5, 0xfffffe00, 0xfff, 0x40, 0x7fffffff, 0x20}, {0xffffff01, 0x8b38, 0x8, 0xfffffffa, 0xb82a, 0xccc}, {0x4, 0x9, 0x0, 0x5, 0x0, 0x6}, {0x4, 0x7ff, 0x1, 0xa23, 0xffffffff, 0x1}, {0x316, 0xffff, 0x931, 0x6, 0x14000000, 0x4d8d2061}, {0x2, 0x40, 0x401, 0x9f, 0x0, 0x9}, {0x48c, 0x7, 0x5, 0x2, 0x20}, {0x3, 0xa000, 0x0, 0x8, 0xe4, 0x6}, {0x8, 0x9, 0x1f, 0xfffffffc, 0x7, 0x80000000}, {0xa30, 0xbc11, 0x100, 0x7, 0x0, 0x7bb5}, {0xe3, 0x7ff, 0x6, 0x80, 0x1, 0x1f}, {0x0, 0x0, 0x1ff, 0x6, 0x1, 0x38e}, {0x9, 0x9b, 0x0, 0x5, 0x80000, 0x7}, {0x80000001, 0x9, 0x81, 0x6, 0x81, 0xf3}, {0xffff, 0x1, 0x1, 0x1000, 0xffff, 0x200}, {0x9, 0x1, 0x4, 0xb78e, 0xffffff33}, {0x770, 0x18b, 0x80, 0x80000000, 0x7f, 0x9647}, {0x7fffffff, 0x6, 0x80000000, 0x81, 0x1, 0x8001}, {0x7, 0x1f, 0x32a2, 0x80, 0xfc, 0xea}, {0x0, 0xbd, 0xad, 0x6, 0xfffffffb}, {0xfff, 0x7ff, 0x1, 0xf440, 0xb1, 0x8}, {0xffffffff, 0x7, 0x32ee, 0x1, 0x4, 0x2}, {0x6, 0x2, 0xaa, 0x200, 0xb6e, 0x7}, {0x7ff, 0x7fffffff, 0x3, 0x80000000, 0xff, 0x9c6d}, {0x6, 0x1ff, 0xfff, 0x14c, 0x6, 0x2}, {0x5, 0xfffffffd, 0x0, 0x6, 0x5019, 0x7}, {0x912, 0x7f, 0x3, 0x2, 0x4, 0xfffffff9}, {0xabe5, 0x6, 0x6, 0x200, 0x3cab, 0x6}, {0x80, 0x80000000, 0x0, 0x4, 0xa1, 0x3}, {0x8, 0x7, 0xd9ea, 0x3, 0x8, 0x4}, {0x7, 0x6, 0x5, 0x8b, 0xa90, 0x1}, {0x5, 0x54c7259f, 0x5, 0x2, 0x7f, 0x1}, {0x4, 0x6, 0x1, 0x1000, 0x1ff, 0x8}, {0xffffffff, 0x6, 0x8e, 0x3, 0x2, 0x3}, {0x200, 0x7, 0x4, 0xfffffe02, 0x7}, {0x7fff, 0x8, 0xf5, 0x7, 0xf67, 0xde}, {0x1, 0x2, 0x9, 0x7fffffff, 0x7, 0x4cef}, {0xf, 0x4, 0x200, 0x80000001, 0x7, 0xfffffffb}, {0x4, 0x20, 0x7fff, 0x3, 0x117d, 0x7}, {0x4, 0xe12, 0x80, 0x0, 0x0, 0x1}, {0xfffffff7, 0x6, 0x8, 0x1, 0x100, 0x6}, {0x6, 0x9, 0x7f, 0x545, 0x668, 0xdfdf}, {0xe64, 0x0, 0x4, 0x0, 0x1, 0x1}, {0x7, 0x6, 0x0, 0x5, 0x8, 0x2}, {0x4, 0x87f, 0x80000001, 0x96, 0x1, 0x800}, {0x800, 0xf1c, 0x1ff, 0x3f, 0x6, 0x80}, {0xa0000, 0x9, 0x0, 0x6, 0x9, 0x8}, {0x2, 0x7, 0x165, 0x5, 0x7, 0x7}, {0x0, 0x8000, 0x40, 0xfffffffa, 0xfffffffb, 0xd4}, {0x4, 0xee4, 0x7, 0xb3e, 0xff7, 0x4}, {0xffffffff, 0x7, 0x7}, {0x1, 0xfffffffa, 0x0, 0xfffffffa, 0x3, 0x2}, {0x9, 0x4, 0x3, 0x2, 0x989, 0x5}, {0x5, 0x100, 0x1, 0x7, 0x9, 0xed09}, {0x3, 0xe16, 0x4, 0x9, 0xf3, 0x3}, {0xa37, 0xfffffffb, 0x1, 0x1, 0x0, 0x9}, {0xffffffff, 0x7fff, 0x8, 0x200, 0x4, 0xfffffffd}, {0x7fff, 0x7f, 0x2, 0xfffffffb, 0x2}, {0x10000, 0x3, 0x10001, 0x2, 0x0, 0x9}, {0x1, 0x800, 0x5, 0xadfd, 0x200, 0x7fff}, {0xff, 0xceb, 0x3, 0xa67e, 0x546, 0x7}, {0x6, 0xfffffffa, 0x10001, 0xffffffff, 0x9, 0x80000001}, {0x8, 0x5, 0xfffff5b3, 0x40000000, 0x5, 0x80000001}, {0x0, 0x8, 0x61, 0x3, 0x5}, {0x18000000, 0x0, 0x80000001, 0x200, 0x8, 0xd}, {0x3ff, 0x4, 0x70, 0x80000000, 0x8, 0x3}, {0x6f, 0x6, 0xffffffff, 0x8000, 0x3, 0x81}, {0x7, 0x7fff, 0x88, 0x401, 0x401, 0x4}, {0x3, 0x0, 0x8, 0xffff, 0x8, 0x6}, {0x40, 0x4, 0x4, 0x100, 0x2e, 0x51}, {0x5485, 0x0, 0x80000001, 0x9, 0x6, 0x6}, {0x8001, 0x1, 0x5, 0x6, 0x7, 0x3}, {0xfffffb74, 0xdc, 0x84ed, 0xa8, 0xfffffffe, 0x5}, {0x9, 0x5, 0x9, 0x43, 0x3, 0x7}, {0x100, 0xffffffc1, 0x2, 0x0, 0x5, 0x8000000}, {0x2, 0x800, 0x2, 0x1, 0x401, 0x3800}, {0x1, 0x6, 0x8, 0xc30, 0x8, 0x1}, {0xb48, 0x4, 0xffffffff, 0x3, 0xffffffff, 0x2}, {0x101, 0x6, 0x401, 0x100, 0x7, 0x4}, {0x4, 0x4, 0x2, 0x7, 0x9, 0x9}, {0x4, 0x20, 0x7fff, 0x670e, 0x0, 0x3}, {0x0, 0x7ff, 0x4b, 0xd6e3, 0x9, 0x9}, {0x2, 0x3, 0x0, 0x3, 0x9, 0x4}, {0x0, 0x1000, 0x4, 0x80, 0x1, 0xfffffff8}, {0x1, 0x7, 0x0, 0x9dab7113, 0x7f, 0x26}, {0x4, 0x3, 0x3ff, 0x3, 0xa39f, 0xc5}, {0x2, 0x101, 0x0, 0x3, 0x61, 0x516}, {0x7ff, 0x3, 0x0, 0x4, 0x8, 0xad}, {0x400, 0x8000, 0x1, 0xffff, 0x1, 0xc2}, {0x7, 0x4, 0x1000, 0x401, 0x2, 0x20}, {0x3, 0x8000, 0x1e, 0x9, 0x4, 0x400}, {0x5, 0x0, 0xad794b2, 0x628, 0x1, 0x4}, {0x80, 0x5, 0x9, 0x8000, 0x7fff, 0x100}, {0x0, 0x7ff, 0x8, 0x2, 0x80, 0x32f9}, {0x8000000, 0x0, 0x86, 0x8, 0x4, 0x5}, {0x800, 0x8, 0x1, 0x8, 0x8000, 0x1}, {0x7, 0x76, 0x800, 0x100, 0x1c580000, 0x2}, {0x0, 0x423, 0x81, 0x3, 0x1, 0x4}, {0x7, 0xffffff81, 0x4cf6, 0xff, 0x0, 0x1}, {0x4, 0x4, 0x4, 0x8000, 0xfff, 0x39ba}, {0x100, 0x3, 0x89, 0x8001, 0xfffffc01, 0x5}, {0x28cd1fbf, 0x4, 0xfffffffd, 0x3, 0x7, 0x3ff}, {0x0, 0x8, 0x800, 0xfffffff8, 0xdf, 0x4}, {0x0, 0x3, 0x2, 0x4, 0x7, 0x180000}, {0x0, 0x7f, 0x1ff, 0xffffffff, 0x84db, 0x1}, {0x68d, 0xfc000000, 0x211, 0x1, 0x7}, {0x8184, 0x7, 0x904, 0x6, 0x587ba14c, 0x400}, {0xffffffcf, 0x6, 0x7ff, 0x938a, 0x401, 0x7fff}], [{0x0, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x5}, {0x3}, {0x5, 0x1}, {0x4}, {0x2}, {0x3, 0x1}, {0x5}, {0x4}, {0x3, 0x3}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {0x1, 0x1}, {}, {}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x2}, {0x5}, {}, {}, {0x3}, {0x0, 0x1}, {0x2, 0x1}, {0x3}, {0x3}, {0x3}, {0x2}, {0x0, 0x1}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x2}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {0x0, 0x6a2d72ff5cdadc1d}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x2}, {0x4}, {0x5}, {}, {0x2}, {0x2, 0x1}, {}, {0x4}, {0x1}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x2}, {0x3}, {0x1, 0x3}, {0x3, 0x1}, {0x5}, {0x1}, {0x5}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4}, {0x1}, {0xbf6debbf65d29a41}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1}, {0x1}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {0x3, 0x1}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x3}, {0x2, 0x1}, {0x1, 0x1}, {0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x3}, {0x4, 0x1}, {0x3}, {0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x4, 0x1}, {0x2}, {0x4}, {0x3, 0x2}, {0x5}, {0x2}, {}, {0x3}, {0x2, 0x1}, {0x2}, {0x5}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {0x4}], 0x1}}, @TCA_PEDIT_PARMS={0xe68, 0x2, {{{0x76c4, 0xa0, 0x2, 0x800, 0x4}, 0x7f, 0x0, [{0x1ff, 0x8, 0xfffffff9, 0x76, 0x80, 0x3}, {0x3, 0xfffffffb, 0x2220, 0x0, 0x6, 0x8000}, {0x1, 0x5, 0x5, 0x800, 0x0, 0xfffffffc}]}, [{0x9, 0x6, 0x80000000, 0x0, 0x7, 0x7f}, {0x9, 0x3, 0x4, 0x2, 0x7, 0x6631}, {0x180000, 0x2, 0x9, 0x4, 0x8, 0x1ee}, {0x6, 0x38000, 0x7, 0x2, 0x10001, 0x581}, {0x7, 0x7, 0x2, 0x5, 0xfffffff7, 0x8}, {0xcf5, 0x5, 0x80000000, 0x86e, 0x9, 0x10001}, {0x2fa3, 0xbdc, 0x101, 0xc663, 0x3ff, 0x4}, {0x1, 0x80, 0xdbe3, 0x3, 0x8, 0x3}, {0x800, 0xa9, 0x6, 0x1, 0x3, 0x40}, {0x80000000, 0x5, 0x40, 0x7fff, 0x14, 0x3}, {0x1, 0x5, 0x4, 0x10000, 0x0, 0x6}, {0x401, 0x3, 0x6, 0x1, 0x3f, 0x7}, {0x7fff, 0x7f, 0x0, 0x108, 0x5, 0xce23}, {0x19, 0x0, 0x8, 0x6, 0x200, 0x2}, {0x1f, 0xff, 0x7, 0x2, 0x8000, 0x8}, {0x0, 0x6, 0x6, 0x5, 0x5, 0x13a}, {0x400, 0x400, 0xf2, 0x2, 0x4, 0x101}, {0x3, 0x1, 0x8, 0xfff, 0xfffffff7, 0xf0}, {0x4, 0x20, 0x8, 0x800, 0x87, 0x1f}, {0x8000, 0x8001, 0x9, 0x0, 0xfffeffff, 0x2}, {0x180000, 0x8, 0x9, 0x5, 0x1, 0xffffffff}, {0xb158, 0x3, 0x51, 0x5, 0x1f, 0xff}, {0x81, 0x8, 0x4, 0x3, 0x8001, 0x6}, {0x9, 0x60e, 0x5, 0x80, 0x10000, 0x7ff}, {0xfffff178, 0x7, 0x7, 0xffffff4a, 0x8, 0x8}, {0x6, 0x3ff, 0xfffffffc, 0x8, 0x2, 0xffffff92}, {0x5, 0xb350, 0x5bf6, 0x3, 0xcc, 0x1}, {0x3, 0x5545, 0x5, 0x3938, 0x5, 0xa32}, {0xff, 0x9, 0x1, 0x0, 0x100, 0x3}, {0x4, 0x1, 0x1, 0x784, 0x101, 0x4}, {0xfffffffb, 0x10001, 0x6, 0x0, 0xe606, 0x3}, {0x8001, 0x9, 0x6, 0x1, 0x9, 0x5}, {0x9, 0x1f, 0x0, 0x0, 0x401, 0x4}, {0xff, 0x7fffffff, 0x8000, 0x1, 0x1, 0x8}, {0x5, 0x8001, 0x6, 0x6bff, 0x6, 0x200}, {0x1, 0x400, 0x0, 0x9, 0x8, 0x1}, {0x1, 0x8a, 0x5, 0x10000, 0x800}, {0x2a0c, 0x10000, 0xdc52, 0xfffffffb, 0x3ff}, {0x9f49, 0x3f, 0xd3, 0x1, 0x1, 0xffc0000}, {0x4, 0x4, 0xc8, 0x4, 0x0, 0x81}, {0x0, 0x9, 0xac, 0x7, 0x20, 0x6}, {0xda, 0x40, 0x9, 0xcd51, 0x40, 0x81}, {0x3, 0x401, 0x0, 0x1ff, 0xcbd9, 0x4f}, {0x2, 0x6, 0x0, 0x7fffffff, 0x6, 0xff}, {0x5, 0x2, 0x1, 0x5, 0x12c8, 0x401}, {0x400, 0x1, 0xfffffff9, 0x6, 0x6, 0x6}, {0x1000, 0x200, 0x7, 0x3, 0xfffffff8, 0x1}, {0xfffff233, 0x5, 0x43a, 0x0, 0x0, 0x2}, {0x8, 0x3f, 0x7, 0x1269, 0x6}, {0x6, 0xfffffff9, 0x8000, 0x8, 0x4, 0x400}, {0x3, 0x1, 0xb56d, 0x2, 0x1ff, 0x4}, {0x80, 0x2, 0x81, 0x20, 0x101, 0x4}, {0x1ad0, 0x4, 0x3, 0x1, 0x4, 0x80}, {0x5, 0xfffffc00, 0x800, 0x401, 0x1, 0x6}, {0x5, 0x200, 0x3f, 0x7, 0xfffffde7, 0x7}, {0x0, 0x2f70, 0x99, 0x8, 0x0, 0x3}, {0x3, 0x6, 0x10000, 0x4, 0x7fd, 0xfffffe01}, {0x6, 0x1, 0x3ff, 0x9, 0xfffff203, 0xfffffffe}, {0x1, 0x4, 0x8, 0x3, 0x800, 0x4a}, {0x4, 0x6, 0x2, 0x2, 0x8000, 0x7fff}, {0x7, 0x9, 0x4, 0x3, 0x8, 0x2}, {0xffff8001, 0x8001, 0x60000, 0x400, 0x81, 0x80}, {0x1, 0x3, 0x1ff, 0x7ff, 0x7fffffff, 0xd515}, {0x5b2, 0x2, 0x1, 0xffffffff, 0x10000, 0x596a}, {0x0, 0xfffffcbc, 0x1a, 0x2, 0x8001, 0xfc1}, {0x8000, 0x401, 0xff, 0x40, 0x4, 0x5}, {0x4, 0x7fffffff, 0x4, 0x6, 0xf30b, 0x1}, {0x2, 0x5, 0x7, 0x10001, 0x8000000, 0x10000}, {0x9, 0x3, 0x6, 0x3, 0xffff0001, 0xfffffffd}, {0xe0, 0x401, 0x40000000, 0x986, 0x9, 0x2}, {0x673, 0x8, 0x1f, 0x9, 0x5, 0x6}, {0x275, 0x3, 0x80000000, 0x5cf, 0x7, 0x73}, {0x101, 0x5fb, 0x4, 0x7, 0x8, 0xfffffffc}, {0x1, 0x2, 0x4, 0x7, 0xfff, 0x5}, {0x401, 0x1, 0xf, 0x1, 0x4, 0x238}, {0x400, 0xebe, 0x0, 0x4, 0x7, 0xfff}, {0x8000, 0x3f, 0x7f, 0x3ff, 0x9, 0x400}, {0x3, 0x5, 0x80000001, 0x1, 0x80000001, 0x3f}, {0x1, 0x0, 0x800, 0x6, 0x8, 0x8}, {0x3965, 0x401, 0x40, 0x7fffffff, 0x0, 0xffffffff}, {0x6, 0x7f, 0x200, 0x3, 0xe4, 0x7f}, {0x5, 0xfffffffd, 0x3, 0x80000000, 0x200, 0x4}, {0x7, 0x36a6, 0x1, 0xfff, 0x6, 0xffff}, {0x6, 0xfa3, 0x6, 0xfffff000, 0x1, 0x8}, {0x82, 0x2c1, 0x1000, 0x0, 0x241, 0xf4}, {0x2, 0x7c, 0xaa2, 0x7, 0x7fff, 0x6}, {0x5, 0x1, 0x0, 0x2, 0x5e428394, 0x1dd}, {0x7acc6454, 0x7ff, 0x8, 0x0, 0x8, 0x2}, {0x5, 0x80000000, 0x0, 0x3, 0x2}, {0x100, 0x1000, 0xce, 0x177, 0x1, 0x3ea50d08}, {0x3ff, 0x0, 0x1ff, 0x3fe4b515, 0x0, 0x8000}, {0x80000001, 0x7, 0x1ff, 0x5, 0x2f7, 0x1}, {0xb0, 0x8, 0x9, 0x80, 0xff, 0x1ff}, {0x8, 0x800, 0x3, 0x0, 0xfffffff8, 0x80000001}, {0x2, 0xb2, 0x1, 0x80, 0xa41, 0x80000001}, {0x0, 0x1, 0xbe50, 0x800, 0x0, 0x1f}, {0x1ff, 0x101, 0xe2, 0x6ef, 0x2, 0x4}, {0xda25, 0x1, 0x7, 0x3, 0xca07, 0x5}, {0x1800000, 0x40, 0x0, 0x9, 0x3d, 0x8001}, {0x100, 0x200, 0x8000, 0x8, 0x68, 0x5}, {0xffffffff, 0x20, 0x4, 0x3, 0x6, 0x9}, {0xffffffc0, 0x7f, 0xc0000000, 0x2, 0xdc82, 0x20}, {0x6, 0x7, 0x6, 0x5, 0x621f, 0x5}, {0x73ad, 0x9, 0x1, 0x6, 0x800, 0x9}, {0x3ff, 0x4, 0x6, 0x200, 0x3, 0x3f}, {0x7, 0x1291, 0x4, 0x2, 0x55ee, 0x5efbcaba}, {0x3, 0x3ff, 0x3, 0x2f4f, 0x5d81dfe4, 0x7}, {0x200, 0x7, 0x8, 0xf71, 0x2, 0x69c2}, {0x6, 0x803, 0xffff, 0xfffffff9, 0x46, 0xd8eb}, {0x4000, 0x0, 0x0, 0x4, 0xfff, 0x6}, {0x0, 0x7, 0x7ff, 0x8000, 0x1, 0x6}, {0x1, 0x0, 0x1, 0x2, 0x5, 0xee7}, {0x80, 0xff, 0x80000001, 0xed8, 0x6, 0xffffffff}, {0x2, 0x0, 0xed3, 0x0, 0x1400000, 0x10000}, {0x8, 0x80000001, 0x3ff, 0x1, 0x6, 0xfffffff7}, {0x6, 0x100, 0x7bb, 0x7, 0x65ac, 0x5}, {0x0, 0x3, 0x0, 0x7, 0xe18e, 0x5361}, {0x6, 0x70c3e506, 0x6, 0x80000001, 0x6, 0x4}, {0x9, 0x7fffffff, 0x3, 0x3ff, 0x5, 0x7ff}, {0x991, 0x3, 0xfffffff8, 0x3000000, 0x4, 0x101}, {0x7f, 0x6, 0x7ff, 0x0, 0x8, 0x2}, {0x9, 0x80000001, 0x5ae, 0xfff, 0x3, 0x86}, {0xffffffe0, 0x7fff, 0x9b78, 0xffff8001, 0x3, 0x9}, {0x0, 0x5, 0x2, 0xd6c, 0x5, 0xf896}, {0x1, 0x48, 0xffff2652, 0x2, 0x10000, 0x400}, {0x8000, 0xb0, 0x4, 0x3ff, 0x7fffffff, 0x5}, {0xb4a, 0x0, 0x1, 0x3, 0x6, 0x13fe000}, {0x8001, 0xfffffff7, 0x5, 0x6, 0x100, 0x8}], [{0x0, 0x1}, {0x5}, {0x1}, {}, {}, {0x1, 0x1}, {0x3}, {0x1}, {0x5, 0x1}, {0x1}, {0x4, 0x1}, {0x2, 0x1}, {}, {}, {0x5, 0x1}, {0x5}, {}, {0x1}, {0x4}, {}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x6fb25992d76887b0}, {0x1}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {}, {0x3}, {0x5}, {0x5}, {0xb28235af23c8dcb7}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x2}, {}, {0x5}, {0x3}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x4}, {0x5}, {}, {0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x5, 0xb9a22637d30f3d57}, {}, {0x3, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {}, {}, {0x5, 0x1}, {0x4}, {0x1, 0x1}, {0x1}, {0x2}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x1, 0x21aa886ed27a3e91}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x5}, {0x2, 0x1}, {0x5}, {0x4, 0x1}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4}, {0x3, 0x1}, {0x3}, {0x2, 0x1}, {0x4, 0x1}, {0x3, 0x59237ce20d3ea623}, {0x4}, {0x4}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x2, 0x1}, {0xc976b0962d43b650, 0x1}, {0x2}, {}, {0x3}], 0x1}}, @TCA_PEDIT_PARMS={0xee0, 0x2, {{{0x6, 0x9, 0x5, 0x0, 0x10001}, 0x9, 0x8, [{0x80, 0x8001, 0x2, 0x3, 0xf1fa, 0xde1}, {0xa4c0, 0x7fffffff, 0x1, 0x7, 0x40, 0x1}, {0xffffff81, 0x0, 0x8, 0x958, 0x3, 0x3f}, {0x101, 0x200, 0x6f, 0x8b, 0x3, 0x5}, {0x10001, 0x7f, 0x0, 0x9, 0x2, 0x3}, {0x2, 0x5, 0x26c, 0xfff, 0x3f, 0x1}, {0x80, 0x3, 0x6, 0x8, 0x7fff, 0x6}, {0xfff, 0x27b649b4, 0x104, 0x1, 0x3f, 0x6}]}, [{0x3, 0x1, 0xfffffffa, 0x9, 0x7ff, 0xff}, {0x10000, 0x80000000, 0x8000, 0x1, 0x8, 0xffffffe0}, {0x1, 0xfff, 0x0, 0x6, 0xffffffe0, 0x6c921f74}, {0x80000000, 0x8, 0xff, 0x80, 0x5, 0x80}, {0xffffffff, 0x5e5, 0x10000, 0x4d, 0x6a0, 0x3}, {0x4, 0x80000001, 0x7ff, 0xe0e8, 0x0, 0x81}, {0x1000, 0x1, 0x10000, 0x2ae, 0x1, 0x1}, {0x7, 0xfffffdd7, 0x3ff, 0xee, 0x1, 0x29}, {0x80000001, 0x0, 0x1, 0x82, 0x80000000, 0x2}, {0x1, 0x8, 0x1, 0x6, 0xda6c, 0x3}, {0x5, 0x2, 0x12, 0x9, 0x3, 0x8000000}, {0x6, 0x1, 0x3, 0x9, 0x0, 0x8}, {0x2, 0x0, 0x0, 0x5abc, 0x30000000, 0x1}, {0x0, 0x9, 0x26db, 0xf78d, 0x2, 0x6}, {0xa8, 0x200, 0x9, 0x6, 0x4697}, {0xc8, 0xb79, 0x7, 0x4, 0x40, 0x1}, {0xf02, 0x31b, 0x1, 0x4, 0x6, 0x7ff}, {0x80000001, 0x4, 0x0, 0x80000000, 0x2, 0x78}, {0x3, 0x3, 0x8, 0x0, 0x7, 0x7fffffff}, {0x0, 0x1000000, 0x336, 0x9, 0x3, 0x1}, {0x200, 0x4, 0x4, 0x9, 0xffff, 0x8}, {0xcf, 0x200, 0x5, 0xfffffffb, 0x3, 0x6}, {0x1000, 0xe4eb, 0xffff, 0x436c, 0x0, 0x1000}, {0x7fffffff, 0x4, 0x2, 0x7fffffff, 0x4, 0x50d1443}, {0x0, 0x7, 0x8, 0x200, 0xfffffff7, 0x7}, {0x20, 0x0, 0x5, 0x9, 0x5, 0x7}, {0x20, 0xfffffffa, 0x0, 0x7, 0x7f, 0x6}, {0x4, 0x0, 0x400, 0x81, 0x1, 0x3}, {0x9, 0x4, 0x80000001, 0x80000001, 0x1, 0x80000001}, {0x6, 0x40, 0x4, 0x6, 0x639, 0xc1}, {0x7, 0xbf3f, 0x0, 0x60cb6701, 0x7, 0x80000000}, {0xa03, 0x7fffffff, 0x6, 0x20, 0x100, 0x6}, {0x30000000, 0xfff, 0x800, 0xffff7fff, 0x6, 0x3}, {0x80000000, 0x8000, 0x4, 0xffffffff, 0x8, 0x2}, {0x1, 0x1, 0x2, 0x3, 0x80000000, 0x1}, {0x8, 0x8, 0x9, 0x6, 0x3d78, 0x9}, {0x40, 0x7, 0x10001, 0x3f, 0x5, 0x6}, {0xffffffff, 0x20, 0x7, 0xfd5, 0x0, 0x28000}, {0x6, 0x9, 0x4, 0x7fffffff, 0x4, 0x8}, {0x20, 0x9, 0x2ad, 0x8, 0x2, 0x3}, {0x6, 0x9, 0x400, 0x1ff, 0x3, 0x800}, {0x1000, 0x3, 0x8, 0xffff, 0x8000, 0xff}, {0x200, 0x101, 0x4, 0x10000, 0xfffffff7, 0x4}, {0x7ff, 0x7ff, 0xffff, 0xa08, 0x1000, 0x6}, {0x7, 0x0, 0x5, 0x5078, 0x0, 0x1}, {0x7b, 0xffff0000, 0x20, 0x0, 0x8, 0x21d19d76}, {0xc0000000, 0x3, 0x9, 0x3fc00, 0x10000, 0x7c000000}, {0x0, 0x81, 0x5, 0x0, 0x200, 0x4}, {0x8001, 0x4cf, 0x4, 0x9, 0xffff}, {0x67e, 0x4, 0xc1, 0x40, 0x3ff, 0x5}, {0x7, 0x17d, 0x3, 0x10000, 0x80000000, 0x7}, {0x1, 0x3, 0x1, 0x46320000, 0x0, 0x16ad}, {0x81, 0xd90, 0xfffff000, 0x7, 0x9, 0x29d}, {0x1, 0xfffff800, 0x40, 0x6, 0x0, 0x6}, {0x8, 0xffffffff, 0x0, 0x4, 0xfff, 0x1}, {0x800, 0x0, 0x80000000, 0x4, 0x3ff, 0x7}, {0x5, 0x5d0, 0x41e8, 0x3f, 0x3f, 0x8}, {0x1, 0xfff, 0x8001, 0x4, 0xfffffffc, 0x9}, {0x100, 0x1ff, 0x1, 0xffffffff, 0xea, 0x10000}, {0x3, 0x9a5, 0x9, 0x401, 0xfffffe00, 0x80}, {0x8, 0x0, 0x1, 0x3, 0x200, 0x8}, {0xffffffff, 0x9, 0x0, 0x8001, 0xfffffffe, 0x20000}, {0xff, 0x101, 0x3f, 0x78, 0xb5d, 0xfffffff9}, {0x7, 0x8, 0x0, 0x5, 0x2}, {0xfffffff9, 0x7d0, 0x401, 0xc43, 0x5, 0x5}, {0x41c4, 0x3ff, 0x5, 0xd58f, 0x8000, 0x9}, {0x7, 0x5, 0x64, 0x5, 0x26, 0x4}, {0xe0000000, 0x4, 0x8000, 0x1, 0xe6f, 0x6}, {0x0, 0x401, 0x101, 0x101, 0x5, 0x3}, {0x3ff, 0xff, 0x9c2, 0x1, 0x2, 0xe73}, {0x2, 0x9, 0x20, 0xffffffff, 0x81, 0x3}, {0x9, 0x14bb49c6, 0x7fff, 0xc1, 0x7fffffff, 0x16b}, {0x10001, 0x8c, 0x1, 0x3, 0xfffff565, 0xce80}, {0xfffffeff, 0xa6c, 0x4, 0x80, 0x6, 0xff}, {0x6, 0x40, 0x9, 0x5, 0x1, 0x7ff}, {0x5, 0x10, 0x1, 0x48, 0x0, 0x8000}, {0x4, 0x9, 0x8, 0x0, 0x6, 0x9}, {0x30a, 0xd8bf, 0x7, 0x99f5, 0x7, 0x2}, {0xb0, 0x7, 0x4, 0x80000000, 0x9, 0x8001}, {0x2, 0x1, 0xfffffffa, 0x8d0, 0x8, 0x3}, {0x1000, 0x7, 0x10000, 0x3ff, 0xeea, 0x8}, {0x0, 0x3f, 0xfffffffa, 0x8, 0x41c, 0x5}, {0x1, 0x25, 0x5, 0x2, 0x7, 0x101}, {0xe1, 0xd350, 0x80000001, 0x3, 0x3f, 0x7}, {0x8, 0x8, 0x3, 0x38dc, 0xa55, 0x8}, {0x6, 0x33e, 0x9, 0x5, 0xfffff000, 0x9}, {0x4, 0x6, 0x101, 0x0, 0x0, 0x7fff}, {0x2, 0x2, 0x7fff, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x5f, 0xff, 0xe862, 0x6}, {0x80000000, 0xcd, 0x1, 0x5}, {0x3, 0x4, 0x8, 0x9, 0xfffffff9, 0x9b6a}, {0x7, 0x1, 0x5, 0x1, 0x3, 0xffffffff}, {0x2, 0x8, 0x80, 0xbea, 0x40}, {0x0, 0x7, 0xfffffc01, 0x0, 0x52a1, 0x74}, {0xaa, 0x2, 0xfffffffa, 0x8000, 0x6ac, 0xff}, {0xfffff001, 0x2, 0x7, 0xffffffff, 0x0, 0xb1}, {0x3, 0x7fffffff, 0x7fffffff, 0x94, 0x80000001, 0x10000}, {0x5, 0xde5f, 0x40000000, 0x7, 0x8}, {0x1, 0x5, 0x8, 0x1, 0x0, 0x4}, {0x7, 0x4, 0x40, 0x6, 0x7ce8, 0x8}, {0xab88, 0x4d800000, 0x0, 0x81df, 0x86}, {0x7, 0x0, 0x3, 0x0, 0xfff, 0x101}, {0x81, 0x8, 0x100, 0x5, 0x2, 0x821}, {0x8, 0x40, 0x1f, 0x40, 0x1, 0x4}, {0xffff, 0x0, 0x9, 0x9dd, 0xd6c, 0xa398}, {0xfffffeff, 0x0, 0x1, 0x0, 0x0, 0x37b3}, {0x5, 0xfa100000, 0x80, 0x0, 0xa5f8, 0x2}, {0x54e, 0x0, 0x7f, 0x9, 0xfffffffa, 0x40}, {0x8, 0x14a, 0xd6eb, 0x1, 0x5, 0x76f}, {0x2, 0xfffffffe, 0x5, 0x2c, 0x1, 0x8001}, {0xc791, 0x6, 0xfbf, 0x4, 0x5, 0x401}, {0xfff, 0x0, 0x4, 0x8, 0x9, 0x5720}, {0x80000001, 0x1, 0xe35, 0x956, 0x5962, 0x1ff}, {0x48a, 0x1, 0x5, 0x7, 0xf3ab, 0x8}, {0x81, 0x400, 0xd0, 0x9, 0x5ad, 0x4}, {0x0, 0x80000001, 0x2, 0x1, 0x0, 0xf5d}, {0x4237cc80, 0x0, 0x1, 0x410a, 0xffffffff, 0x8}, {0x2, 0x1, 0x9, 0x3f, 0x8, 0x4}, {0xb9, 0x9, 0x1, 0x6, 0x93a, 0x5}, {0x5, 0x400, 0x2, 0x100, 0x80000000, 0x7f}, {0x401, 0x5, 0xe0, 0x6, 0x0, 0x40}, {0x5, 0xb1, 0x5, 0x3, 0x20, 0x7c197b8b}, {0x6, 0x3, 0x4, 0x39f, 0x8, 0x2}, {0x234, 0x4, 0x10000, 0x4, 0x0, 0x6}, {0x3f, 0xfffffffb, 0xffffffff, 0x3c1e, 0x6, 0x6}, {0x9, 0x7, 0x0, 0x4, 0x8, 0x8}, {0x31, 0x4, 0x5, 0x6, 0x81, 0xffffff4a}, {0x3ff, 0x2, 0x7a05, 0x7, 0x1, 0x2}], [{0x0, 0x2}, {0x1}, {}, {0x1}, {0x2}, {0x2, 0x1}, {0x4}, {}, {}, {0x1, 0x1}, {}, {}, {0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x2}, {0x0, 0x1}, {0x5}, {0x4}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x2}, {0x4, 0x1}, {0x5}, {0x4}, {0x5}, {}, {0x3, 0x1}, {}, {0x4, 0x1}, {0x3}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x2}, {0x1}, {0x1}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x5}, {0x1, 0x1}, {0xa, 0x1}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x2}, {0x5, 0x1}, {0x2, 0x1}, {0x4}, {}, {0x1}, {0x4, 0x1}, {0x4, 0x996c0a070543bf86}, {0x4}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {0x4}, {0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4}, {0x5}, {0x5, 0x1}, {0x1}, {0x0, 0x1}, {0x4}, {0x4}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x2}, {0x5, 0x1}, {0x1}, {0x3, 0x1}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x4, 0x2}, {0x5}, {0x4}, {0x4, 0x1}], 0x1}}]}, {0xea, 0x6, "5aa8e92c4027e06aa717ce7ff053956756851e52ceac2882702618a5bc4822ad5bb8b87c950a3debc6128caefce2ee4f4c6ba25197ed2eb5f798fde82b7c1437a89f1df8bcfb87cffb711f72fa18546b96fc817bac2dc312eee457f06182a99152f2fbc089aa916904931f10ab7a3b7746038703c97aca1d66496ad086a2131f9792c3884f5e988fe60b41c6bfe36ca1e4374ee2b240ccb2798466c0c9585b98003779dcbde7c6d19d1b1af4ea2c06f4d828534de4eaaa1ba06c6a0c655de9971a4cca437a0e29de06070e74c9b003e50d3f887d5c2c5a1d12aa1108b0e11afef1f7b87c0a39"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_csum={0x8c, 0x4, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x7f, 0x4e0, 0x10000000, 0xfffffc01, 0xfffffff8}, 0x1e}}]}, {0x42, 0x6, "c93254fa51ba3d4686e9bca4a024102500860d7701e672cf6f0e41baa4effd6c2619dcb786ad54dda1f5c32ed815711696362255bc245a7a779e0f9ada5c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_pedit={0x1e9c, 0x6, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1e4c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xeb0, 0x2, {{{0x1146c2a, 0x9, 0x5, 0x7, 0x8cc}, 0x1, 0x20, [{0xe2, 0x1, 0xffff, 0x9, 0x800, 0x100}, {0x7, 0x5, 0x5, 0x9, 0xcce, 0x40}, {0x231a, 0x100, 0x9, 0x7ff, 0x0, 0x10000}, {0xff, 0x2, 0x1, 0x3, 0xfffffff7, 0x7f}, {0x7, 0xb37f, 0x10001, 0xc8, 0x7, 0x5}, {0x4, 0x221e, 0x1, 0x6, 0xe7c, 0x401}]}, [{0xffff, 0x6, 0x5, 0x8, 0x3, 0x1}, {0xffffffff, 0x0, 0x3ff, 0x1ff, 0xfff, 0x4}, {0x100, 0x5, 0x0, 0x69, 0xfc, 0x2}, {0x980e, 0x0, 0x0, 0x9, 0x4d, 0x7}, {0xffffffc0, 0x807, 0x4, 0x6, 0xe76, 0xc2}, {0xffff, 0x80, 0x7fff, 0x81, 0x1, 0x94}, {0x2, 0xa8, 0x8001, 0xfffffff9, 0x0, 0x3}, {0x0, 0x5d8, 0x4, 0x8, 0x6, 0xff}, {0x50d, 0x40, 0x3, 0x3, 0x946, 0x1}, {0x401, 0x1ee, 0x6, 0x81, 0x6, 0x8}, {0xffffff01, 0x1, 0xfffffffe, 0x7, 0x101, 0x8000}, {0x10001, 0x80000001, 0x2, 0x2, 0x4, 0x2}, {0x800, 0x2a, 0x2c, 0xed9, 0xba2c, 0x4}, {0xad8, 0x8, 0x800, 0x6, 0x2}, {0x47c8, 0x9e, 0x800, 0xffff8000, 0xfffffff8, 0x4}, {0x100, 0x800, 0x7ff, 0x2, 0xff, 0x9}, {0x98e3, 0x6, 0x2, 0x2, 0xe3, 0x7fffffff}, {0x7ff, 0x0, 0x3, 0x7, 0x20, 0x9}, {0x7, 0x3, 0x0, 0x2, 0x9, 0x5}, {0x4, 0x7ff, 0x35144097, 0x8ac6459, 0x6, 0x9}, {0x90, 0x2, 0x3c97, 0x6, 0x9, 0xd16d}, {0xf93, 0x3, 0x1f, 0x20, 0x990f, 0x3}, {0x8, 0x7ff, 0x5df, 0x2, 0x100, 0x4}, {0x9, 0x8, 0x3, 0x2, 0x40, 0x8}, {0xffffffff, 0x7fff, 0x0, 0x1, 0x3, 0xf6e}, {0x10001, 0x5, 0x6, 0x400, 0x9f84, 0x6}, {0x40, 0x55518d00, 0xbf2c, 0x1, 0x0, 0x6}, {0x4, 0x0, 0xfffffffa, 0x8001, 0x6, 0x2}, {0x7, 0x81, 0x0, 0x0, 0x3, 0x2}, {0x4, 0x8, 0x8, 0x1f, 0xd2, 0x6}, {0x800, 0xfffffff9, 0x2, 0x7f, 0x800, 0x8}, {0x7fffffff, 0x0, 0xff, 0x2, 0xfffff001, 0x8}, {0x7, 0x1, 0x81, 0x86, 0x1, 0x81}, {0x3, 0x80, 0x9fac, 0x2, 0x9, 0x760}, {0x4, 0x1, 0x1, 0x8f, 0x401}, {0xfffff801, 0x6, 0x0, 0x1000, 0x7, 0x9}, {0x1, 0x9, 0x0, 0x3e, 0x7, 0x9}, {0xb00, 0x81, 0x1, 0x7, 0x6, 0x7}, {0x8000, 0x2, 0x7, 0x80, 0x1, 0x1f}, {0x100, 0x6, 0xfffffffe, 0xffff, 0x9, 0x8}, {0x0, 0x1, 0xe19, 0x8, 0x401, 0x7}, {0x100, 0x9, 0x1, 0x6, 0xd5, 0x6}, {0x9, 0x81f, 0xf5, 0xb9, 0x3f, 0x46}, {0x3, 0x8001, 0x0, 0x8, 0x400, 0xfe}, {0x2, 0x8, 0x3, 0x200, 0x4}, {0xffffffff, 0x8, 0xde, 0x9, 0x1, 0x2}, {0xb8, 0xffffffff, 0x4f, 0x8, 0x0, 0x9}, {0x8, 0x96000000, 0x7, 0x2, 0x2, 0x101}, {0x7, 0xf50, 0x6, 0x3, 0xa1, 0x8}, {0x1, 0x1ff, 0x1, 0x52fa, 0x7ff, 0x7}, {0x0, 0x5, 0x1, 0x800000, 0xffffffff, 0xfffffff7}, {0x8, 0x3, 0x8, 0x5, 0x10001, 0x7}, {0x5, 0x3, 0x2d, 0x0, 0x4, 0x7}, {0x9, 0xb3, 0x1, 0x40, 0xffff, 0x81}, {0x348, 0x772a, 0x7fff, 0xd, 0xfffffffb, 0x80000000}, {0x81, 0x7, 0x6, 0x401, 0x4, 0x1c00000}, {0x1f, 0x10001, 0x1000, 0xffffffff, 0x80, 0x7}, {0x0, 0x9, 0x1, 0x10001, 0x80, 0x6}, {0x80000001, 0x9, 0x7, 0x2, 0x9f6e, 0x9}, {0xfffffffa, 0x9, 0x0, 0x33fe5c00, 0x1, 0xc0212e4}, {0x2b71, 0x0, 0x4, 0xfff, 0x5, 0x7}, {0x1, 0x2, 0x800, 0xfffffffb, 0x7, 0x2}, {0x9, 0x9, 0x0, 0x2, 0x7ff, 0x8}, {0x7fffffff, 0x8, 0x8, 0x3, 0xfffffff7, 0x1a44fcd}, {0x2, 0x1, 0x7, 0x7fffffff, 0x2, 0x1ff}, {0x7fffffff, 0x7fff, 0x4, 0x701, 0x8, 0x8}, {0x7, 0x6, 0x10000, 0x4, 0xffff, 0x1}, {0x6, 0x2, 0x10001, 0x8, 0x2, 0x8}, {0x5, 0x2217, 0x10001, 0x9ebd, 0x1000, 0x466}, {0x8, 0x8, 0x7fff, 0x401, 0x0, 0x2}, {0x400, 0x5, 0x5, 0x7fffffff, 0xfffffffa, 0x3}, {0x5, 0x401, 0x100, 0x3, 0x9, 0x10000}, {0x3, 0xfffffffa, 0x7, 0x0, 0x30, 0x3f}, {0x4, 0x883, 0x4, 0x3, 0x0, 0x1}, {0x8, 0x8000, 0x20, 0x4, 0x7fffffff, 0x401}, {0x28, 0xffff, 0x9, 0x4, 0x8000, 0x6}, {0x5, 0x7, 0xdee8, 0x9, 0x8000, 0x7}, {0x8, 0x0, 0x1, 0x8, 0xb1, 0x9}, {0x5, 0x5, 0x7, 0x3ff, 0x6, 0xbb}, {0x2, 0x2, 0x1, 0x3, 0x8001, 0x684c}, {0x8000, 0x4, 0x6, 0x3f, 0x80000001, 0x7fff}, {0xfffff000, 0x401, 0xfffffffa, 0x81, 0x3, 0x3}, {0x10001, 0x52e6fd80, 0xca, 0x9d34, 0xb32, 0x8000}, {0x81, 0x7fffffff, 0x9, 0x4, 0x7, 0xa421}, {0x7fff, 0xc32, 0x6, 0x2000000, 0x4, 0x63a}, {0x0, 0x7, 0x9, 0x9, 0x5}, {0xacd, 0xd99, 0x8, 0x7fff, 0x0, 0x6}, {0x1, 0x2, 0x1, 0x4, 0x8, 0x7fffffff}, {0xffff0921, 0x40, 0xe4, 0x7, 0x10001, 0x29}, {0x9, 0x80, 0x3, 0x3f, 0xfffff801, 0x10001}, {0x9, 0x8, 0xfffffff9, 0xfffffffb, 0x1, 0x5}, {0xfffeffff, 0x0, 0x7, 0x4, 0x5, 0x6}, {0x3, 0x7f3, 0x0, 0x1, 0xde94, 0x1}, {0x0, 0xa9, 0x5887, 0x2ed0, 0x1000, 0x5}, {0x5, 0x80, 0x401, 0x10001, 0x2, 0x80000000}, {0x20, 0x10001, 0x8, 0x0, 0x0, 0x3f}, {0x8, 0xd0, 0x0, 0xde, 0x6, 0x5c}, {0x5, 0xfffffbff, 0x4, 0x5, 0xffffffff, 0x7}, {0xff, 0x3, 0x1b, 0x48, 0x1, 0x800}, {0x7d5, 0x7fffffff, 0x400, 0x6, 0x1, 0x9}, {0x312c, 0x7f, 0x8000, 0x8001, 0x0, 0xffffffff}, {0x0, 0xe6, 0xffffffff, 0x2, 0x2b, 0x31c}, {0x401, 0x8, 0x800, 0x3, 0x0, 0x1ff}, {0x59, 0x8, 0x9, 0xffffff81, 0x80000001, 0xfffffffb}, {0x0, 0x2, 0x5, 0x3ff, 0x0, 0x5eaa}, {0x710a, 0x7ff, 0x51, 0x2334231e, 0x38b0, 0x6}, {0xd735d35d, 0x803, 0x0, 0x20, 0x582b0310, 0x4}, {0x7f, 0x8, 0x4, 0x7ff, 0x2, 0xfff}, {0x7, 0x9, 0xa6e, 0x2, 0x5}, {0x3d8d, 0x1f, 0x2, 0x8ee3, 0x8, 0x7f}, {0x10000, 0x3, 0x6, 0xcefa, 0xfff, 0x401}, {0x4, 0x1ff, 0xffff, 0x0, 0x7, 0x401}, {0x3f, 0x57, 0x0, 0xfff, 0x8}, {0x7ff, 0xff, 0x5, 0xa, 0x1, 0x4}, {0x3, 0x9d, 0x669, 0x8001, 0x1, 0x5}, {0xfffffff8, 0x4, 0x4, 0x167f6f29, 0x3, 0x7}, {0x40, 0x4, 0x5, 0x516d, 0x0, 0x2}, {0x10000, 0x7, 0x400, 0x5, 0x7}, {0x5, 0x7fff, 0x800, 0x9, 0x100, 0x8001}, {0x55, 0x1ae1fe42, 0x180, 0x6, 0x1f, 0x1}, {0x80, 0x1, 0x1, 0x20, 0x91b, 0xcd5}, {0x0, 0x7f, 0x1ff, 0x9, 0x800, 0x3}, {0x48, 0x7f, 0x80, 0x0, 0x0, 0x9}, {0x7ff, 0x3cf4, 0x9, 0xb5, 0x0, 0x9}, {0x1, 0x3f, 0x100, 0x10001, 0xed}, {0xe1c, 0x8, 0x1f, 0x582c, 0x80, 0x7}, {0x1, 0x7fff, 0xfffffffe, 0x800, 0x0, 0x81}, {0x2, 0x80000000, 0xffffffff, 0x2, 0x40, 0xfffffffc}], [{0x8, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x1}, {}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {}, {}, {0x2, 0x1}, {0x5, 0x1}, {}, {0x1}, {}, {0x2}, {0x1}, {}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x2}, {0xca4d2a45048c333c, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x4}, {0x2, 0x25e7e2aa5522b781}, {0x2, 0x1}, {}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x1, 0x1}, {0x4}, {0x5}, {0x4}, {0x3, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x2, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x3}, {0x1}, {0x0, 0x1}, {0x2}, {0x1, 0x1}, {0x5, 0x2}, {0x3}, {0x4}, {0x4, 0x1}, {0x2}, {0x4}, {0x5}, {0x5, 0x1}, {0x3}, {0x2}, {0x1, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x2, 0x1}, {0x1}, {0x5, 0x1}, {0x5}, {0x1}, {0x3}, {0x0, 0x1}, {0x3}, {0x4}, {0x3, 0x1}, {0x3}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x5}, {0x0, 0x1}, {0x1}, {0x5}, {0x3, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {}, {0x2}, {0x5, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x2}, {0x5}, {0x3, 0x1}, {0x4}, {0x3}, {}, {0x3}, {0x4}]}}, @TCA_PEDIT_KEYS_EX={0x40, 0x5, 0x0, 0x1, [{0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}]}, @TCA_PEDIT_KEYS_EX={0x78, 0x5, 0x0, 0x1, [{0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}]}, @TCA_PEDIT_PARMS={0xee0, 0x2, {{{0x7, 0x7ff, 0x10000000, 0x4, 0x4}, 0x8, 0xb8, [{0xff, 0x3, 0xffff, 0x2, 0x3ff}, {0x3, 0x2, 0x9, 0x7fff, 0x2}, {0x200, 0xd8, 0x70, 0x800, 0xff, 0xc8e}, {0x40, 0x3, 0xffff0000, 0x5, 0x7, 0x6}, {0x40, 0x6, 0x6, 0x8, 0x1, 0x126}, {0xffffffff, 0xfff, 0x3, 0x7fffffff, 0xffffffff, 0x1}, {0xffff, 0x2000, 0x1, 0x0, 0x8, 0x8}, {0x5, 0x8, 0x3, 0x3ff, 0x6, 0xff}]}, [{0x0, 0x81, 0x0, 0x40, 0x8, 0xffffffff}, {0x50000000, 0x200, 0x7f, 0x9, 0xda2, 0xec3d}, {0x6, 0x249, 0xfff, 0x9, 0xffff, 0x40}, {0x15, 0x1, 0x2, 0x0, 0x7ff, 0x3e}, {0x1, 0x10001, 0x7fffffff, 0x5, 0x4, 0x3}, {0x7fff, 0x7f, 0xfffffffd, 0x9, 0x3, 0xbdd5}, {0x7fff, 0x6, 0x2, 0x3, 0x3, 0x9}, {0x2, 0x8, 0x1, 0xc35, 0x10001, 0xffff}, {0xf30f, 0x6, 0x20, 0xffffffe0, 0x3, 0x4}, {0x0, 0x0, 0x7ff, 0x74f5, 0x1, 0x200}, {0x8001, 0x5, 0x3, 0x7, 0xfffff800, 0x5}, {0x716, 0x2, 0xff, 0x6, 0x101, 0x3ff}, {0x1, 0x2, 0x5, 0x3d, 0x8, 0x1}, {0xfffffffd, 0xfffffffe, 0x6, 0x200, 0x6b53422d, 0xdbe}, {0x6, 0x3, 0x0, 0x80000001, 0x7ff, 0x40}, {0xb8ab, 0x80000000, 0x7f, 0x8001, 0x1, 0x8001}, {0x1, 0x8, 0x2, 0xc12, 0x6, 0x5}, {0xfffff000, 0x478, 0x1, 0x80000001, 0x19, 0x10000000}, {0x3, 0x10001, 0x8, 0x800, 0xfffffffc}, {0x400, 0x200, 0x5, 0x2e, 0x4, 0x4}, {0x8, 0x10000, 0xffffffff, 0x7, 0x1, 0xe23}, {0x8001, 0x3f, 0x2, 0x1, 0x6, 0xa44b}, {0x0, 0xfff, 0x7, 0x1, 0x8, 0x2}, {0xfff, 0x6, 0xffff, 0x5, 0x1a505230, 0x3}, {0x0, 0x1, 0x80000001, 0x1, 0x7f, 0x7}, {0x0, 0x0, 0xd06, 0xfffff6e4, 0x6, 0x6}, {0xff, 0x1, 0x3ff, 0x5, 0x8b2, 0x9}, {0x0, 0x5, 0x8, 0x101, 0xcb3, 0x3280}, {0x7, 0x2, 0xfffeffff, 0x3, 0xfffffffe, 0x401}, {0x9, 0x400, 0x6, 0x7, 0x4, 0x3}, {0x7, 0x7fffffff, 0x7, 0x81, 0x3ff, 0xfcc0}, {0xc89e, 0x1, 0x3, 0x2, 0x2, 0x7}, {0xf5c, 0x58, 0x8, 0x9, 0x7}, {0x0, 0x5, 0x1, 0x1, 0x1, 0x3}, {0x80000001, 0x2, 0x5, 0x2, 0x80, 0x101}, {0x6, 0x1000, 0x7b0, 0x7, 0x1ff, 0x6}, {0x4, 0xfff, 0x9, 0x0, 0x4800000, 0xc1}, {0x7, 0x2, 0xd65a, 0xff, 0x5, 0xff}, {0x9, 0x7fffffff, 0x9, 0x8, 0xca7, 0x6}, {0x200, 0x3, 0x1ff, 0x6, 0x1, 0x100}, {0x200, 0x2, 0x800, 0x1, 0xf07, 0x8}, {0x8, 0x3, 0x4, 0x9, 0x7, 0xffff}, {0x8, 0xfff, 0x8001, 0x0, 0x5, 0x2}, {0x8, 0x2, 0x7, 0x80000001, 0x9, 0x5}, {0x101, 0x4, 0x7, 0x5, 0x2, 0x11890}, {0x9, 0x1ff, 0x5, 0x1, 0x2, 0x1}, {0x1000, 0x7, 0x4, 0x6, 0x4, 0x6}, {0x2d, 0x2, 0x9, 0x1ff, 0x1, 0x6}, {0x401, 0x7, 0x8001, 0x0, 0x3f, 0x1}, {0x1ff, 0x1, 0xf1c, 0x10001, 0xffffff7f, 0x1}, {0x40, 0x7ff, 0x4, 0x9, 0x200, 0x4}, {0x200, 0xffff, 0x5, 0x40, 0x2, 0x8}, {0x8, 0x9e7f, 0x100, 0x6d, 0x48000000}, {0x7, 0x1000, 0x161, 0x1ff, 0x0, 0x48f8}, {0x1, 0x3f, 0x5, 0xfe63, 0x7, 0xffffffff}, {0x5, 0x7d8, 0x4, 0x6, 0x3, 0x55}, {0x100, 0x5, 0x76, 0x9, 0x6, 0x9}, {0x10000, 0x4, 0xaacb, 0x9, 0x80000001, 0x1}, {0x400, 0x6, 0x3, 0x3, 0x1, 0x100}, {0x5, 0x3ff, 0x0, 0x80, 0x2}, {0x8001, 0x7, 0x80, 0xb9cc, 0x6b, 0x7}, {0xfffffffe, 0x0, 0x1ff, 0x8001, 0x5, 0x27}, {0x40, 0xa74, 0x2, 0x7fffffff, 0x2ce, 0xffffffff}, {0x0, 0x4, 0x0, 0x1, 0x1c0, 0x1}, {0x0, 0x1, 0x4, 0x3, 0x4b0, 0x7fff800}, {0x6, 0xa3, 0xaf, 0xfff, 0x9, 0xfffffe01}, {0x94b5, 0x3d3, 0xa000, 0xde1, 0x400, 0x5}, {0xb7, 0x6, 0x3, 0x378dac5d, 0xf0, 0x9}, {0x5, 0x7f, 0x663, 0x8c, 0x7, 0xfffffffd}, {0x0, 0x1, 0x8, 0x0, 0x8, 0x8000}, {0x8, 0x5, 0x1, 0x6, 0x7, 0x2}, {0x3, 0x9, 0xff, 0x80000001, 0x7, 0x7fff}, {0x0, 0x80000001, 0x40, 0x5, 0x6, 0x7}, {0x100, 0x0, 0x9, 0xfff, 0xff, 0x3}, {0x80, 0x8001, 0x1, 0x7, 0xfffffffb, 0x1}, {0x20000, 0x10000, 0x1f, 0x6, 0x9, 0x2}, {0x1, 0x3, 0x1, 0x0, 0x9, 0x6}, {0x6, 0x6, 0x8, 0x9, 0x7}, {0x7fffffff, 0x4584, 0x100, 0x100, 0x8001, 0x20}, {0x7f, 0x0, 0x5, 0x10000, 0x4, 0xffff}, {0x1, 0x0, 0x800, 0x0, 0x6, 0x1ff}, {0x7, 0x80, 0x1f, 0x81, 0xc000, 0xdf}, {0x0, 0x7f, 0x5, 0x9, 0x86bd, 0xef}, {0xf3, 0x5, 0x8, 0xfffffff7, 0x4, 0x200}, {0x1, 0x7, 0x1, 0x39, 0x7ff, 0x5}, {0x1, 0x80000000, 0x1, 0x0, 0x401, 0x1}, {0x27, 0x66, 0x3, 0x10000, 0x3, 0x3}, {0xf1a7, 0xfffffbff, 0xf5e, 0x60000000, 0x8000, 0x9}, {0x80, 0x4a38, 0x0, 0xfff, 0x7c000000, 0x2}, {0x2, 0x100, 0x800, 0x6, 0x7f, 0x7fffffff}, {0x5, 0x1, 0xf664, 0x3, 0x0, 0x63}, {0x7, 0x1, 0x6, 0x8f, 0xe2, 0x7fffffff}, {0x1, 0x2, 0x2, 0x6, 0xf0000000}, {0x7ff, 0x3, 0x4, 0x1, 0x9f2, 0xffff0034}, {0x1ff, 0xffffffff, 0xbbf, 0x80000001, 0xd10, 0x1}, {0xfffffffe, 0x1, 0x7, 0x400, 0x7, 0x401}, {0x8001, 0x7, 0x8, 0x1000, 0x7, 0x7f}, {0x8000000, 0x100000, 0x1ff, 0x76e, 0x0, 0x5}, {0x4, 0x1, 0xb25, 0x5469f797, 0x6, 0x42c0}, {0x9, 0x0, 0x9, 0x9, 0x3, 0x1}, {0xb769, 0x6, 0x80000001, 0x8a54, 0x1, 0x200}, {0x5, 0x6, 0x7, 0x5, 0x3f, 0x1f}, {0x1, 0x10001, 0x4, 0x6, 0x1, 0x4b67}, {0x6, 0x9, 0x9, 0xffffffff, 0x5}, {0x9, 0xcdb, 0x0, 0x1b31, 0x20, 0x3c79}, {0xffffffff, 0x7fff, 0x2, 0xffffffff, 0x97, 0xef2}, {0x101, 0x8, 0x7, 0x7ff, 0x9, 0x1}, {0x0, 0x7ff, 0x7fff, 0x800, 0x5, 0x4}, {0x9, 0x5b1, 0x4, 0xff, 0x6}, {0x10000, 0x8, 0x7ff, 0x8d, 0x500, 0x4}, {0x1, 0x4, 0x4, 0xffff507e, 0x1ff, 0x4}, {0x6, 0x8, 0x401, 0x5, 0x1, 0x4}, {0x7, 0x3, 0x1ff, 0x5, 0x0, 0x200}, {0x6, 0x3, 0x7, 0x2, 0x6, 0x8000}, {0x0, 0x5, 0x3, 0xc04, 0x400, 0x6}, {0x9, 0x8001, 0x81, 0x200, 0x2, 0x7f}, {0xbacc, 0x8, 0x8, 0x2, 0x10001, 0xff}, {0x2, 0x3f, 0x28f, 0x7fff, 0x5a4e, 0x80000000}, {0x80000001, 0x4, 0xffff8001, 0xfff, 0x80000001, 0x101}, {0x6, 0x5, 0xdd, 0x4, 0x0, 0xffffffff}, {0x5702, 0x6, 0x4, 0xffff, 0xdbba}, {0x6, 0x2, 0x1382f7d0, 0x3f, 0x3, 0x3}, {0x6, 0xfffffff8, 0x8, 0xe0, 0x6, 0x7f}, {0x5, 0x9, 0x81, 0xbc46094, 0x100, 0x3}, {0xd93c, 0xffffffff, 0x0, 0x101, 0x1, 0x40}, {0x6, 0x1, 0xb0, 0x0, 0xbd, 0x9}, {0x6, 0xe379, 0xbd, 0x5, 0x0, 0x80000001}, {0xdc61, 0x3, 0x5, 0xfffffffd, 0x0, 0x4}], [{0x2}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x2, 0x1}, {0x2}, {0x2, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x1}, {0x3}, {0x5, 0x1}, {0x4}, {}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {}, {}, {0x3}, {0x3, 0x1}, {0x5}, {0x3, 0x1}, {0x1, 0x1}, {0x1}, {0x1}, {0x4, 0x1}, {0x4}, {0x3}, {0x3, 0x1}, {0x4}, {0x5, 0x1}, {0x1}, {0x5}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {}, {0x4}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x4}, {0x7}, {}, {0x1, 0x1}, {0x3}, {0x2}, {0x3, 0x1}, {0x5}, {0x5}, {0x2}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {}, {0x4, 0x1}, {0x1, 0x1}, {}, {0x0, 0x1}, {}, {0x4, 0x1}, {}, {0x2}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {0x2}, {}, {0x3, 0x1}, {0x2}, {0x1}, {0x4, 0x1}, {0x2}, {0x5}, {0x1}, {0x5}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x9}, {0x0, 0x1}, {0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x3}, {0x3}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x2}, {0x3}, {0x3}, {0x5}, {0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {0x4}, {0x1, 0x1}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {}, {0x2, 0x1}, {0x3, 0x1}, {0x1}, {0x2}, {0x5, 0x1}, {}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x4}]}}]}, {0x27, 0x6, "1a8f330c446f33226730ec3297b66c51d4e03cdc638ac2ff74da6312d0cd7f0b37d803"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbmod={0x90, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_SKBMOD_DMAC={0xa}, @TCA_SKBMOD_PARMS={0x20, 0x2, {{0x10001, 0x9, 0x0, 0x3, 0x2}, 0x8}}]}, {0x36, 0x6, "bc1765828e90a478d89fa49c5083587bf3253bc22baf69f16f8bb74730fdc5a06b5a6e7251da4a223c5eae4e23831e7bbe16"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_bpf={0x1094, 0x1c, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x6c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xe6b, 0x1ff, 0x3, 0xad73, 0xe5c2}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2, 0x7f, 0x7, 0x4}}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, {0x19a4, 0x1, [@m_nat={0x148, 0x2, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0xf4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x2, 0x2, 0x7, 0x5}, @remote, @empty, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x3, 0xffffffffffffffff, 0xcf, 0xf0}, @rand_addr=0x64010102, @broadcast, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x1, 0x101, 0x2, 0x80000001, 0x4}, @rand_addr=0x64010101, @private=0xa010100, 0xffffff00, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0xffffffc1, 0x832cc2d27f9f852f, 0xffff0001, 0x5}, @broadcast, @loopback, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0x1, 0x20000000, 0x7f, 0x6}, @local, @empty, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x566f, 0x3e43, 0x8, 0x1, 0xffffffe1}, @multicast2, @empty, 0xff}}]}, {0x2e, 0x6, "c0739b38fba494b0d0d87a6cd905d242037d94a662f170cb7c049627b7055c60fb1643faf1f368ab0f51"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_ct={0x180, 0x5, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x68, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @TCA_CT_ACTION={0x6, 0x3, 0x20}, @TCA_CT_PARMS={0x18, 0x1, {0x9, 0x9, 0x20000000, 0x0, 0x10000}}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e20}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e21}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x5}, @TCA_CT_PARMS={0x18, 0x1, {0x9, 0x1c2f, 0x4, 0x7ff}}]}, {0xf2, 0x6, "4298cb7eda22eed61e2cf678bd6f7e5d3dfdacf931688d192dbdf2fd32cb582dfb67da611ab62a8aa5a909204f808c1111c033a023458cba676878fead4417e8f3cb2fbd1cb75c8203e758ffdf11c9ae7f1ee8ea37d8a96cb5c94726ad493c40b4e88ec4431362a12748c0d2a92d81ab0c976c5be8934d5b8a80152db007f08f2175a07029c1ba3a22b3f8e1a452052d048b94b4de3e26e171aad88be4d2027f1aed2c10e5c650551e973168b8b20314954a412f558d4e5290969f6881ccece493602318c817dc0eceebb67c0ecab92a4d0039fca37b7e7195b3ca5fc2204e3f234f0bca3f74924bc4e575b93500"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_police={0x15a0, 0x1d, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x1500, 0x2, 0x0, 0x1, [[@TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x1000, 0xffff172f, 0x2, 0x3, 0x2, 0x4, 0x9, 0x5d5, 0x8, 0x9, 0x1, 0x1, 0x1, 0x8001, 0x1, 0x7, 0x8a, 0x8, 0x401, 0x5, 0x6, 0x80000001, 0x0, 0xff, 0x1, 0x6, 0x44a8, 0x2f2d, 0x6, 0x1ff, 0x3, 0x1, 0x3ff, 0x3854, 0x3, 0x0, 0x58, 0x0, 0x8, 0x8, 0x1, 0x6, 0xd0, 0x4, 0x40, 0x7, 0x9, 0x6, 0x2, 0xfffffffb, 0xfffff86a, 0x1, 0x6, 0x2e, 0x1, 0x7, 0x50000000, 0x7, 0x7f, 0x95, 0x7, 0x0, 0x39c, 0x3, 0x3, 0x3, 0x200, 0x9, 0x8, 0x7, 0x9, 0x0, 0x9, 0x0, 0x525, 0x7d8, 0x6, 0x4, 0x2, 0x1, 0x7, 0x7, 0x10001, 0x1, 0xf6c, 0x9, 0x0, 0x2, 0x27, 0x5, 0x909, 0x8001, 0x0, 0x1000, 0x7, 0xcc86, 0x4, 0x3, 0x1000, 0x7, 0x4, 0x7, 0x1000, 0x8, 0x4029b4, 0x8a, 0x8, 0x12000000, 0x1, 0x6e5f5ff5, 0x80, 0xffffffff, 0x1, 0x3, 0x2, 0x6, 0x8, 0x4, 0x7, 0xffff, 0x5, 0xf91, 0x7ff, 0x101, 0x4, 0x200, 0xfffffffb, 0x4350, 0x0, 0x8001, 0x2, 0x1, 0x0, 0xd6, 0x3, 0x1, 0x3, 0x8, 0x1, 0x7f, 0x8, 0x4, 0x605, 0x2e85, 0x1f, 0x2a47, 0x4, 0x7, 0xffff, 0x3, 0x4, 0x9, 0x9, 0x1f, 0x51ece477, 0x800, 0x1, 0x0, 0x1, 0x51c, 0x4, 0x800, 0xf1e, 0x4000000, 0x7, 0x7, 0xee6, 0x8, 0x9, 0x8, 0x20, 0x5, 0x54de, 0x3fd4, 0xe3, 0xfffffff8, 0x0, 0x9, 0x1, 0x6, 0x3, 0x9, 0x4, 0xfffffffe, 0x4, 0x9, 0x7, 0x3, 0x4, 0xff, 0x6, 0x133849e9, 0x7fff, 0xa3d1, 0x7, 0xffff, 0x251, 0x6, 0x9, 0x5, 0x2, 0x3f, 0xffffffff, 0x1d, 0x7d5, 0x7, 0x2, 0x4, 0x3ff, 0x6, 0x7, 0x6, 0x40, 0x26, 0x80000000, 0xffff7fff, 0xfff, 0x0, 0x9, 0x8, 0x3, 0x1, 0x2, 0x401, 0x5, 0x8, 0x5, 0x7, 0x9, 0x1000, 0x7, 0x4, 0x7, 0x3, 0x100, 0xf733, 0x4, 0x1e5, 0x4, 0x7, 0x9, 0x6f8, 0x0, 0x13a9, 0x7, 0x9, 0x0, 0x20, 0x9, 0x1d, 0x9, 0x563b, 0x4, 0x81, 0x2]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_TBF={0x3c, 0x1, {0x80000000, 0x10000000, 0x2, 0x1, 0x10000000, {0x8, 0x2, 0x3, 0x1, 0x2, 0x7}, {0x3, 0x1, 0x0, 0x7fff, 0x3, 0x8}, 0x0, 0x1, 0x4000000}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x40}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x61b0, 0x80, 0x40000000, 0x1, 0x0, 0x4, 0x800, 0x8, 0x518b, 0x6, 0x8, 0x3, 0x586d, 0x951, 0x101, 0x1, 0x20, 0x62, 0x0, 0x8, 0x4, 0xfffffffe, 0xd7b6, 0x28, 0x7, 0x7fff, 0xffff, 0x1, 0x81d, 0x100, 0xfffffffa, 0x80000000, 0x3f, 0x100, 0x80000000, 0x5, 0x5, 0x5, 0xff, 0xff, 0x2, 0x6, 0x721e57d4, 0x2e4a, 0x244d, 0x9, 0x4, 0x9, 0x3, 0x0, 0x1, 0x573, 0x6c0a2cef, 0x1a8a, 0xffffffff, 0x400, 0x3ac, 0xbdab, 0x1, 0x8001, 0x60a, 0x3ff, 0x167, 0xf5c4, 0x0, 0x0, 0x1, 0xffff, 0x8001, 0x8000, 0x4, 0x10001, 0x0, 0xa2, 0x0, 0x8, 0x5, 0x9, 0x5, 0xb6, 0x5, 0x2, 0x9, 0x6, 0x8, 0xffff, 0xffff, 0x0, 0x0, 0x2, 0x6, 0x1, 0xffffa297, 0x4d800000, 0xfffffff8, 0x3f, 0x68b00000, 0x0, 0x8, 0x9, 0x9, 0xe8, 0x400, 0x8, 0xbb, 0x7, 0x1f, 0x6, 0x80000000, 0x4, 0x2, 0x40, 0x4, 0xa9, 0xc298, 0x5, 0x1, 0x2, 0x80000001, 0x235, 0x2, 0x2400000, 0x7, 0x8, 0x1, 0x11, 0xf5e4, 0x5, 0x59600746, 0x2, 0x2, 0xb, 0x6, 0x7cbb42dd, 0x7fff, 0x7a9, 0x1000, 0x1, 0x0, 0x3, 0xffff0000, 0x1f, 0x0, 0x3f, 0x20, 0x8, 0xffffffe1, 0x1, 0x19, 0x9, 0x1, 0x2, 0x9, 0x3f, 0x2, 0x80000000, 0x7ff, 0xe1, 0x8, 0xfff, 0x53fd4096, 0x8000, 0x471, 0xffffffff, 0x66b4c169, 0x3, 0xa8, 0x9, 0x51, 0x80, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x10001, 0xfffff33e, 0x80000001, 0x6, 0x9, 0xffffffff, 0x584, 0xab7, 0x1000, 0xfffffffd, 0xf00, 0x5, 0x1f, 0x91, 0x6, 0x80000000, 0x1f, 0x1f, 0x1f, 0x4, 0x2, 0x0, 0x1000, 0x6, 0x1203, 0x0, 0x8, 0x8, 0x0, 0x2, 0x8ed, 0xffffffc1, 0x3, 0x400, 0x10001, 0x7fffffff, 0x9, 0xa9e4, 0x7fff, 0x1ff, 0x9, 0x4, 0x3, 0x903, 0x200, 0x5795, 0x2, 0x2, 0x1, 0x5, 0xde1, 0x20, 0x7, 0x2, 0xfffffffe, 0x836, 0x1, 0x9, 0x7fff, 0x6, 0x3149cefa, 0x401, 0x5, 0x1, 0x8, 0x8001, 0x2a, 0x2, 0x80000000, 0x9, 0x0, 0xf4fe, 0x2, 0x3, 0xfffeffff, 0x4, 0x2, 0x5, 0xff, 0x6]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x40000}, @TCA_POLICE_RESULT={0x8, 0x5, 0x200}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x20000000, 0x459, 0x21, 0xfffffffa, {0x20, 0x1, 0xffff, 0x0, 0x7, 0x7}, {0x20, 0x2, 0x200, 0x200, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffff}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x5}, @TCA_POLICE_RATE64={0xc, 0x8, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4382}, @TCA_POLICE_RATE={0x404, 0x2, [0x200, 0xffffffff, 0x2, 0x7, 0x6, 0x5, 0x5, 0x13, 0x0, 0x8, 0x7fffffff, 0xfffff000, 0x8000, 0x6, 0x8, 0x6, 0x4, 0x100, 0x1ff, 0x6, 0x7, 0x1, 0x80000001, 0x1000, 0x8, 0x0, 0x493c, 0xf7a, 0x7, 0x4, 0x5, 0xfffff35b, 0x10001, 0x2, 0x7ff, 0x7, 0x2, 0x1, 0x100, 0x20, 0x4, 0x73e2770a, 0x20, 0x95e, 0x3f, 0x8001, 0x5, 0x6, 0x8, 0x9, 0x1f, 0xfffffff9, 0x7fffffff, 0xa7, 0x5, 0x2, 0x5, 0x8, 0x690f, 0x0, 0x5, 0x0, 0x1, 0x4, 0x7, 0x2b3, 0x9, 0x36, 0x3ff, 0x0, 0x7, 0x3a, 0x7f, 0x5, 0x8, 0x7, 0x8000, 0x0, 0xfff, 0x1, 0x1, 0x1, 0xff, 0x3, 0xb, 0x7, 0xfffffffa, 0x66, 0x7, 0x8, 0x0, 0x3f, 0x400, 0x80, 0x1, 0x0, 0x7, 0x37ba180d, 0x5d, 0x8, 0x8, 0x986, 0x0, 0x8001, 0xf3ae, 0xffff, 0x400, 0x9, 0x1, 0x5, 0x9, 0x0, 0x7fb3, 0x10001, 0x2, 0x0, 0x7, 0x7fff, 0x1f, 0x5, 0x3, 0x2, 0x6, 0x20, 0x0, 0x9, 0xfffffffd, 0x4, 0x3ff, 0x3, 0x5, 0x9, 0x14000000, 0x83ac, 0x29465565, 0x8, 0x5, 0x1000, 0xb59, 0x1, 0x1, 0x3d9, 0xfffffffb, 0x101, 0x5, 0x81, 0x3ff, 0x1f, 0xfe, 0x8, 0x2, 0x7520d1f5, 0x8001, 0x6, 0x80000001, 0x5, 0x401, 0x1, 0x8, 0x9, 0x6, 0x81, 0x10001, 0x80, 0x200, 0x3, 0xf9a, 0xffffffff, 0xb8e6, 0xfffff817, 0x2, 0x10001, 0xfffffff2, 0x7, 0xaa, 0xc870, 0xfa1, 0x1000, 0x2, 0xfffffc01, 0x1, 0xffff, 0xad, 0x3, 0x2f, 0x7cd, 0x0, 0x5, 0xc, 0x7, 0xffffffff, 0x3, 0x2, 0x5, 0x6, 0x8, 0x7, 0x7, 0x401, 0x80000000, 0x7, 0x9, 0x0, 0x3, 0x80, 0xbfbf000, 0x3, 0x1, 0x7, 0x6, 0xc27, 0xfffffff9, 0xb98, 0x8a53, 0xfffffff9, 0x5, 0x9, 0x3ff, 0x3, 0x0, 0x8, 0x400, 0x2, 0xfffffffa, 0x0, 0xffff, 0x2, 0xa9f, 0xffff, 0x7, 0x0, 0x7, 0x4f, 0x6b, 0x10001, 0x1, 0x5, 0x1, 0x4, 0x3f, 0x0, 0x2, 0x400, 0x200, 0x60692097, 0x200, 0x5, 0x7, 0x0, 0x4, 0x2, 0x9, 0x0, 0x1, 0xffffffe0, 0x5]}, @TCA_POLICE_RESULT={0x8, 0x5, 0xffffffff}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x401, 0x4, 0x8000, 0x2000, 0x765, 0x0, 0x1f, 0x8, 0x3, 0x2400000, 0x1, 0x6, 0x8000, 0x4, 0x6, 0x6, 0xffff, 0x1000, 0x1ab7, 0x1ff, 0x9, 0x8, 0x80, 0x401, 0x5d, 0x1c, 0x80, 0x9, 0xffff, 0x2, 0x6a, 0x6000, 0xb92, 0x8, 0x1, 0x0, 0x8, 0x400, 0x1, 0x6, 0x0, 0x1, 0x3, 0x4000, 0x3, 0x10000, 0x56, 0x5, 0x8, 0x3, 0xdfd, 0x3, 0x257b, 0xff, 0x4, 0x1, 0x7, 0x401, 0x6, 0x2, 0x3, 0x3, 0x1ff, 0x6, 0x7fff, 0x22, 0x10000, 0x7, 0x6, 0x20, 0x7, 0x899, 0x1000, 0x1, 0x3, 0x96, 0xee27, 0x6, 0xd4, 0x6, 0x8, 0x3, 0xba, 0x2, 0xcbc, 0x6, 0x80000000, 0xf8ef, 0x3, 0x5, 0x43ff, 0x6, 0x62, 0x1, 0x3, 0x6, 0x0, 0x5, 0x4, 0xffffffff, 0x101, 0x200, 0x4, 0x1908, 0x8, 0xffffffff, 0x4, 0x1000, 0xe3f, 0x80000000, 0x0, 0x81, 0x6, 0x1, 0x1ff, 0x2, 0x7, 0x9, 0x45, 0x80, 0x5, 0xfffffffe, 0x2, 0x6, 0x6, 0xa78, 0x5, 0x1, 0x80000000, 0x5, 0x2, 0x9, 0x0, 0xffffaba5, 0x9, 0x7, 0x8, 0x3ff, 0x2, 0x400, 0x2, 0x5, 0x7, 0x10001, 0x8000, 0xfffffffd, 0x80000000, 0x7fff, 0x1ff, 0x2, 0x9, 0x7ea, 0x800, 0x7ff, 0x1, 0xd789, 0x5, 0x6, 0x6, 0xfffffff7, 0x101, 0x1, 0x3958, 0xc910, 0x5, 0x8, 0x1000, 0x0, 0x8000, 0x5, 0x10001, 0x1f, 0x480000, 0x1, 0x1ec8, 0x0, 0x3, 0x45, 0x0, 0x4, 0x2, 0xff, 0xfff, 0x4, 0x1, 0x5, 0x3, 0x200, 0x6, 0xb5, 0xf60b, 0x5, 0x77b6, 0x3, 0x6, 0x8, 0xc1, 0x80, 0x7ff, 0x7f, 0x1, 0x0, 0x47, 0x200, 0xa000, 0x4, 0x7fff, 0x9, 0x8, 0x6, 0x0, 0x3bafab21, 0x5, 0xc3c, 0x7, 0x2, 0x8000, 0x0, 0xffffff00, 0x5, 0x2, 0x1, 0x7c, 0xffffffff, 0x9, 0x25, 0x8000, 0x200, 0x80, 0x6, 0xffffffc1, 0x9, 0x93e, 0x2, 0x400, 0x2, 0xffffff7f, 0x165f, 0x4, 0x80000001, 0xfffffff9, 0x73, 0x10000000, 0x8, 0x2, 0x9, 0x6, 0x632c, 0x400, 0x9, 0x7, 0x5, 0x80000000, 0x80000000, 0xfff, 0x4]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x80000000}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x53d, 0x9, 0x8, 0x40, 0x3, 0x3, 0x8, 0x3, 0x5, 0x9, 0x2, 0x1, 0x7, 0x5, 0x3, 0x4, 0x10001, 0x5, 0x5, 0x7, 0x2381, 0x80000000, 0x3, 0x6, 0x29, 0x3, 0x9, 0x4, 0x7f, 0x6, 0x8, 0x9, 0x1, 0x8001, 0x7, 0x3, 0x6, 0x813c, 0x100, 0x6, 0xf42, 0xf8c, 0x200, 0x9, 0x4, 0x6, 0x9, 0xee, 0x9, 0xbce, 0xbbb9, 0x10001, 0x7, 0x905, 0x6, 0x3, 0x80, 0x9, 0x1, 0x200, 0xd4b, 0x5a2, 0x1ff, 0x6, 0x200, 0x0, 0xb3, 0x8, 0x5, 0x8, 0x4, 0x4409, 0xdeec, 0x616, 0x800, 0xb78, 0x9, 0x3, 0x3, 0x3, 0x0, 0x1, 0x841, 0x8, 0x8, 0x1160bd16, 0x1000, 0x6, 0x800, 0x2, 0x3, 0xffff, 0x1ff, 0x80000000, 0x4, 0x0, 0x266aaf81, 0x3, 0xff, 0xffffe000, 0x5, 0x800, 0x0, 0xfffffffd, 0x3, 0x1000000, 0x77a28056, 0x1ff, 0x7ff, 0xfff, 0x7, 0x5, 0x8, 0x2, 0x100000, 0xf3, 0x2, 0x9, 0x8, 0xe91, 0x1, 0xfffffff9, 0x1, 0x27f1, 0x9, 0x3ff, 0x6, 0x7fff, 0x5, 0x1d0be8dd, 0x6a9, 0xffffffff, 0xf50, 0x6, 0x5, 0x7b, 0x1, 0x3, 0x1, 0x8, 0x7, 0x80000000, 0x6, 0xa91f, 0x800, 0x200, 0x5, 0xfffffff9, 0x3, 0x7, 0x5, 0xfffffff7, 0x5b, 0x1ff, 0x0, 0xfff, 0x1ff, 0x800, 0x7ff, 0x3ff, 0x3, 0x0, 0x74c, 0x2, 0x72b1, 0xdb54, 0x9, 0x6, 0xc9d9, 0x7, 0x3ff, 0x7, 0x8, 0x3, 0x0, 0x2, 0x8, 0x0, 0x800, 0x2, 0x9, 0xfffff470, 0x9, 0x1, 0x100, 0xfffffffc, 0x4, 0x1, 0xffffffff, 0x1f, 0x8, 0x10000, 0x6, 0x7f, 0x1, 0x400, 0x8, 0x7, 0x80000000, 0xffffffff, 0x0, 0x8001, 0x0, 0x1000, 0xcec6, 0x0, 0x3, 0x9, 0x8, 0x2, 0x8001, 0x673d, 0x7, 0x9, 0x7f, 0x5, 0x9, 0x1, 0x0, 0x8, 0x6, 0x9, 0x3, 0x6, 0x6, 0x8, 0x256, 0x5, 0x263, 0x8, 0x3, 0x9, 0x4bf4aa0a, 0xfffffffd, 0x1f, 0x40, 0x5, 0xfffffff8, 0x3, 0xe, 0xae78, 0x100, 0xb14e, 0x5, 0x8, 0xf0, 0x10001, 0x3, 0x5c, 0x622c, 0x38f, 0xcc70, 0x8, 0x7ff, 0x2, 0x9]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}]]}, {0x77, 0x6, "1f69b0c88ea9c62f5d323b5a3b51cc71d11312cc75ad09d77c43e29c0d00bf03cb1a6164d8918d7a4d136c3fa056c6536cda97eca6adabb0452a0bead2207452ebd81942768d15fa5b9619780d54e9e3404a660e8f7985c5e3256771a93249259d7d5ee9987d9351eeac8d6a2622a559072059"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_sample={0x8c, 0x4, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x7}]}, {0x58, 0x6, "33b5adf4bd0899e52915588353e059521f38822d9a80ea35f1fb911ddab705e4ad67408be6e16a183f675742dc319978e6b303ec89ea27a8f173d0b0525051376bfa89e840c9075918280bc6809659fb332c9cb7"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_mpls={0xac, 0x16, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5, 0x7, 0x2}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x6e, 0x6, "f5ac8851768016adab4cb7a2f762fe745cea92b6f41c0dc8ce5b8be5772feea51deaec1c521302dd2e87188d8c30a113ba991006d1f205f4c4ccbb582650608ba38551e542b616a1c139830189887e52062b4b3aad71b7b75c6e724374e0e94866c2f4df8d00f0333294"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}]}, 0xd338}}, 0xe1de285d79b6f650) 09:37:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x100) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x201) ioctl$PPPIOCSACTIVE(r0, 0x40087446, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6}]}) [ 247.479563][ T9373] __nla_validate_parse: 6 callbacks suppressed [ 247.479625][ T9373] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 248.001973][ T9373] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 09:37:45 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b010100000000090401000186ee0d0009058217", @ANYRESDEC], 0x0) syz_usb_control_io(r0, 0x0, 0x0) 09:37:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="8c0800003000050000000000000000000000000078080100740801000b000100706f6c69636500004808028004040200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004040300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c0001000000000000000000000000000000000000000000040000000000000001000000080000000000000006000000000000000000000000000000040006000c00070000000000000000000c00080000000000000000001a2ca7967c862fecbf38ce157d5a20de50795dbdddae3a201ee8467d9ed7f5fbc922b11084af5a5b627788a90dd8b4cab4220c9476411abc8f3548355bf9a9ae8bf4538dc3e56e3256bafa5353ce251884055c4fcdb3f424c87495d7ebd0836568535825302624b60218b74d3ac22fe55f0ab411329223653e9e80bbae15d68dde81cbededa6505417c4e8b88b2283ffc0d4172f5f5ec42cb60da898043f94569cad24e7a54b9a55b82f4d348a6a4f43e3641b"], 0x88c}}, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 248.509944][ T9400] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 248.519719][ T9400] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 248.581400][ T9401] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 248.592915][ T9401] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 248.687414][ T1985] usb 3-1: new high-speed USB device number 2 using dummy_hcd 09:37:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="b40000003000ffff000000000000000000000013a0000100500001000b0001006d697272656400002400028020000200000000000000000000000000000000000000000004000000", @ANYRES32=r3, @ANYBLOB="040052410c00070000000000000000000ce5070000000000000000004c00020009004df94a24db25baa75a01006373756d000000002000028004000100000000000000000000000000000000000000000000000000040006000c00070000000000000000000c0008000000000000000000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 248.929124][ T1985] usb 3-1: Using ep0 maxpacket: 32 [ 249.049880][ T1985] usb 3-1: config index 0 descriptor too short (expected 283, got 27) [ 249.058369][ T1985] usb 3-1: config 0 has an invalid interface number: 1 but max is 0 [ 249.066512][ T1985] usb 3-1: config 0 has no interface number 0 [ 249.073321][ T1985] usb 3-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 52, changing to 9 [ 249.084667][ T1985] usb 3-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 249.094729][ T1985] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 249.120441][ T1985] usb 3-1: config 0 descriptor?? [ 249.134831][ T9405] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 249.165670][ T1985] snd_usb_pod 3-1:0.1: Line 6 Pocket POD found [ 249.169753][ T9407] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 09:37:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x2}]}}]}, 0x3c}}, 0x0) [ 249.388970][ T1985] snd_usb_pod 3-1:0.1: Line 6 Pocket POD now attached [ 249.592392][ T1985] usb 3-1: USB disconnect, device number 2 [ 249.610101][ T1985] snd_usb_pod 3-1:0.1: Line 6 Pocket POD now disconnected 09:37:46 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000080)=""/4096, 0x1000) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='I', 0x1}]) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f00)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=r5, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYRESDEC=r3], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000480)={r2, "8f77544f767e704583ec6742b1e08d00"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000440)={0x0, "897aeb27205a87b454d84cfc49bd188f"}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000001440)={0x14, 0x0, {0x9, @struct={0x7, 0x1cf653ef}, 0x0, 0x401, 0x101, 0x7, 0x5d69, 0x5ad9, 0x0, @struct={0x7fffffff, 0x6}, 0x1, 0x1, [0x7fff, 0x7, 0x6, 0x1ff, 0x100000000, 0xffffffffffffffb7]}, {0x80000000, @usage=0x7, r3, 0x101, 0x8, 0x1, 0x0, 0x3, 0x55, @usage=0xfffffffffffffffa, 0xff, 0x5, [0x7, 0x7f, 0xa6, 0x4, 0x40b0, 0x3]}, {0x7fffffff, @usage=0xfffffffffffffffa, r6, 0x81, 0x4, 0x3, 0x6, 0x6, 0x8, @struct={0x9, 0x1}, 0x6, 0x1, [0x100000000, 0x8, 0x100000001, 0x6, 0x5, 0x2c]}, {0x5, 0x3ff, 0x2}}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000002080)={{}, {@val, @max='max'}}) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001080)={r3, "9d11009616acce00a244daacda193c83"}) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0x7fff, 0x4) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) [ 249.891303][ T9425] device lo entered promiscuous mode 09:37:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x400}, {&(0x7f00000008c0)="fa018e8d9bbfd88d9cd11cd97965", 0xe, 0x1}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="047d9c3a1090e92048cd6e329c7766563ef093eb4d335c3a1526ea31d4d0c70a933f666b9316b180c796349c8325a4d4f419e8b992116b9a0fcdd2d1337114509232835596292ee8dcdf7aeeea9108315c706357702bd0b4fd3a8b7beba71484b15dd44e1c65c24549e6f941d1fe5558ee6aea04b80be20ace72ffe06a9f7363faca79c3d654621a5f5999ace87ccc18cdab76cbf500cb84265dcf1b21697eed7bf803f478e663ab8d1dbb61173c99d57c77e3fb324a6ad9bb0138f233c83000"/208]) [ 250.197250][ T9426] Y­4`Ò˜: renamed from lo [ 250.292592][ T9430] loop0: detected capacity change from 4 to 0 [ 250.329934][ T9430] FAT-fs (loop0): Unrecognized mount option "}œ:é HÍn2œwfV>ð“ëM3\:&ê1ÔÐÇ [ 250.329934][ T9430] “?fk“±€Ç–4œƒ%¤Ôôè¹’kšÍÒÑ3qP’2ƒU–).èÜßzîê‘1\pcWp+дý:‹{맄±]ÔNeÂEIæùAÑþUXîjê¸ â [ 250.329934][ T9430] ÎrÿàjŸscúÊyÃÖTb_Y™¬è|ÌÍ«vËõ" or missing value [ 250.387845][ T1985] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 250.560557][ T9430] loop0: detected capacity change from 4 to 0 [ 250.575871][ T9430] FAT-fs (loop0): Unrecognized mount option "}œ:é HÍn2œwfV>ð“ëM3\:&ê1ÔÐÇ [ 250.575871][ T9430] “?fk“±€Ç–4œƒ%¤Ôôè¹’kšÍÒÑ3qP’2ƒU–).èÜßzîê‘1\pcWp+дý:‹{맄±]ÔNeÂEIæùAÑþUXîjê¸ â [ 250.575871][ T9430] ÎrÿàjŸscúÊyÃÖTb_Y™¬è|ÌÍ«vËõ" or missing value 09:37:47 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000080)=""/4096, 0x1000) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='I', 0x1}]) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f00)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=r5, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYRESDEC=r3], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000480)={r2, "8f77544f767e704583ec6742b1e08d00"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000440)={0x0, "897aeb27205a87b454d84cfc49bd188f"}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000001440)={0x14, 0x0, {0x9, @struct={0x7, 0x1cf653ef}, 0x0, 0x401, 0x101, 0x7, 0x5d69, 0x5ad9, 0x0, @struct={0x7fffffff, 0x6}, 0x1, 0x1, [0x7fff, 0x7, 0x6, 0x1ff, 0x100000000, 0xffffffffffffffb7]}, {0x80000000, @usage=0x7, r3, 0x101, 0x8, 0x1, 0x0, 0x3, 0x55, @usage=0xfffffffffffffffa, 0xff, 0x5, [0x7, 0x7f, 0xa6, 0x4, 0x40b0, 0x3]}, {0x7fffffff, @usage=0xfffffffffffffffa, r6, 0x81, 0x4, 0x3, 0x6, 0x6, 0x8, @struct={0x9, 0x1}, 0x6, 0x1, [0x100000000, 0x8, 0x100000001, 0x6, 0x5, 0x2c]}, {0x5, 0x3ff, 0x2}}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000002080)={{}, {@val, @max='max'}}) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001080)={r3, "9d11009616acce00a244daacda193c83"}) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0x7fff, 0x4) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) [ 250.650485][ T1985] usb 3-1: Using ep0 maxpacket: 32 09:37:48 executing program 0: clone(0x4a00980, &(0x7f0000000040)="5d54952bea4688a744ed7dad50104c53d7ab8f3a69542621fbf56dd846fa631d2e9687029926ef8ba34276ab9561a8dfd802d7f4702933f9348d2b58d5bfe0e1764517936f396129", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000200)="88f99300526a3f9ce031111b270eaa66321e878e973554d02660ab35d8f60b7a60c8d8edfb2dc7eff454f2ee6dd255db911ff30a4f509c21409aac237a70ccdb41e167667154407ae1662b00f1ecf192cc3f55f98f2d35cbc2e7f9ced410644dbb4094a817cf59488f950836e830c654db661f44fc8925b869efb8a486aedd9040f38e") r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0x38}}, 0x0) [ 250.768297][ T1985] usb 3-1: config index 0 descriptor too short (expected 283, got 27) [ 250.776665][ T1985] usb 3-1: config 0 has an invalid interface number: 1 but max is 0 [ 250.785130][ T1985] usb 3-1: config 0 has no interface number 0 [ 250.791458][ T1985] usb 3-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 52, changing to 9 [ 250.802761][ T1985] usb 3-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 250.812290][ T1985] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 250.984212][ T1985] usb 3-1: config 0 descriptor?? [ 251.039148][ T1985] snd_usb_pod 3-1:0.1: Line 6 Pocket POD found 09:37:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000b00)={{0x1b, 0x5b, 0x7, 0x7, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x105d, 0x40}, [{}]}, 0x78) r2 = openat$proc_capi20(0xffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x42400, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x16}, 0x4}}, [0x4, 0x9, 0xfffffffffffffffd, 0x7f, 0x1f, 0xffffffff, 0x3, 0x6, 0x2, 0x34acae4, 0x3, 0x200, 0x3f, 0x2, 0x100000000]}, &(0x7f0000000180)=0xfc) [ 251.257787][ T1985] snd_usb_pod 3-1:0.1: set_interface failed [ 251.263977][ T1985] snd_usb_pod 3-1:0.1: Line 6 Pocket POD now disconnected [ 251.271989][ T1985] snd_usb_pod: probe of 3-1:0.1 failed with error -71 [ 251.339174][ T1985] usb 3-1: USB disconnect, device number 3 09:37:48 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000080)=""/4096, 0x1000) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='I', 0x1}]) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f00)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=r5, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYRESDEC=r3], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000480)={r2, "8f77544f767e704583ec6742b1e08d00"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000440)={0x0, "897aeb27205a87b454d84cfc49bd188f"}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000001440)={0x14, 0x0, {0x9, @struct={0x7, 0x1cf653ef}, 0x0, 0x401, 0x101, 0x7, 0x5d69, 0x5ad9, 0x0, @struct={0x7fffffff, 0x6}, 0x1, 0x1, [0x7fff, 0x7, 0x6, 0x1ff, 0x100000000, 0xffffffffffffffb7]}, {0x80000000, @usage=0x7, r3, 0x101, 0x8, 0x1, 0x0, 0x3, 0x55, @usage=0xfffffffffffffffa, 0xff, 0x5, [0x7, 0x7f, 0xa6, 0x4, 0x40b0, 0x3]}, {0x7fffffff, @usage=0xfffffffffffffffa, r6, 0x81, 0x4, 0x3, 0x6, 0x6, 0x8, @struct={0x9, 0x1}, 0x6, 0x1, [0x100000000, 0x8, 0x100000001, 0x6, 0x5, 0x2c]}, {0x5, 0x3ff, 0x2}}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000002080)={{}, {@val, @max='max'}}) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001080)={r3, "9d11009616acce00a244daacda193c83"}) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0x7fff, 0x4) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) 09:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x40080, &(0x7f00000002c0)=ANY=[@ANYBLOB="64723f085253c1f5d64e83616e73c4ed5111eb3d66642c72", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=mmap,cache=fscache,smackfsdeq=,subj_user=)+$-!#(-*{{,smackfsfloor=,smackfshat=--#,subj_role=,fsname=@])&![][,smackfshat=!,euid>', @ANYRESDEC=r4, @ANYBLOB=',\x00']) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r5, &(0x7f0000000000)={0x1f, @fixed}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) statx(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000180)='./file0\x00', 0x80000000, 0x3, &(0x7f00000001c0)=[{&(0x7f00000003c0)="75818a3798d6a406addb026d87844909dabe62640fa431669a323af136a1731e832d09f1ba5573e65fab42b6fb49efa700277c919e611f76ef7121d9e4e3a50de439f4683a7c1c9a9e582d9c8fcf32bd19f2066c398a6d7a713f349991940042bfb17083f82ca810537067c95b61d7988ce278386fa33d61facff9b06dbb9a2a41ca0bdab7a0675be8acb3d52fd2264b19c486cac93612c70a92c7e6a8ae1aa47f6b179d2493737a0c2c9f2356a4cc8062f1d60bc8d821d27ba6b7436ec640d6c2694ad2b67a9aa306ed480da3fd", 0xce, 0x2}, {&(0x7f00000004c0)="4c76e40c04a5e63d90609c3639375d8ccf0fe89a3a8c8de14301bbd0b97b77e416cc5947c743f99fe333ba42db1b92f214130c20f94b997507d8fe29a83ea620f63e15f3bdaeb0dd42293875141b78743e42bc1eb17d3b2ae6b69c0d84f4bd019507d21f6aaaabd83ee4477cd96cf711b165381cd4611c1c3992029d1e16ba9eabdc37cf8035969dffcc102b0aceb8687012b8eb628cf6cada7e45721fde87d9ff59f6d554c119e2223ac141d3057f12065f27ce72930ac876b615dc4c66e24e56f1edd57f9674ccbeca2805935a4a8f4a02ac3b1dced64950f46661", 0xdc, 0x6}, {&(0x7f0000000740)="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", 0x1000, 0x9}], 0x8002, &(0x7f0000001740)={[{@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}], [{@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r4}}, {@fowner_gt={'fowner>', r6}}, {@fowner_gt={'fowner>', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '9p\x00'}}, {@fowner_gt={'fowner>', r4}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r8}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 09:37:49 executing program 0: r0 = syz_usb_connect(0x0, 0x3b, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x4f, 0x4e, 0x44, 0x8, 0x12d1, 0x79b2, 0x627, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x1, 0x9, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x400}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f00000001c0)={0x18, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000013c0)={0x14, &(0x7f00000011c0)={0x40, 0x22, 0x100, {0x100, 0xa, "b2c72bd0a3d67349414ee7705e7df84621ddcb61afaa7af0cf6a2aaae3116034201f76b13664ee00c8d48cabcde26d161af8057dbff5d1ed554a1c5750b839ec7a6e1950600ebeb1cad031e54fe0fafe145f071e0c2d64e9068687376a1f00d0cc4825563ef0f8a5f447f19a90c385b7e617736cbf6489990cf335efaa250e80651e8bf7262a255419065b18c961e5714a37e51fc7c2a554feec24cf0132d3f1ec3333062348a03828ab155d138b835db21a298e62c62de37c135575ad68170783c0843022c374bb1f1afd63fc787d216bdd0fd2a9edeb908731d0dd101012968b9ebea9b8cca2252442e69bee6f8fdcdd3cca24c459d7ae421043a33091"}}, &(0x7f0000001300)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000001340)={0x0, 0x22, 0xc, {[@main, @local=@item_012={0x0, 0x2, 0x8}, @main=@item_012={0x2, 0x0, 0x9, "1ab7"}, @global=@item_4={0x3, 0x1, 0x9, "0d9087cc"}, @local=@item_012={0x1, 0x2, 0xe, "90"}]}}, &(0x7f0000001380)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x5, 0x1, {0x22, 0x926}}}}, &(0x7f0000001580)={0x18, &(0x7f0000001400)={0x0, 0x9, 0x5f, "a96bc0904092a7aae91f69023006d929df054ce34b3d20815453eddb1230b34c7232f6f93a74f9b465049533650cbd8b79705481436eef8ff46e2634fc03b0166a7a94ad1c7c769bfaea72247e90ad49d83510b09f317ed3d88f437a5b191c"}, &(0x7f0000001480)={0x0, 0xa, 0x1}, &(0x7f00000014c0)={0x0, 0x8, 0x1, 0x9}, &(0x7f0000001500)={0x20, 0x1, 0x29, "b1ce72289f0273d345587ddeed2ab1f1404acaa7ee48abc064599befafec64b62a3e53383ade8261b4"}, &(0x7f0000001540)={0x20, 0x3, 0x1, 0x3e}}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000001900)={0xc, 0x0, &(0x7f00000018c0)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) r1 = syz_usb_connect$cdc_ecm(0x6, 0x62, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x50, 0x1, 0x1, 0x1f, 0x90, 0x7, [{{0x9, 0x4, 0x0, 0x81, 0x3, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "84d9e6"}, {0x5, 0x24, 0x0, 0xfffc}, {0xd, 0x24, 0xf, 0x1, 0x7ff, 0x5, 0x2, 0x1}, [@obex={0x5, 0x24, 0x15, 0x2}, @acm={0x4, 0x24, 0x2, 0x4}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x8, 0x7f, 0xf8, 0x1f}}], {{0x9, 0x5, 0x82, 0x2, 0x200, 0xd3, 0x7, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x5, 0x20, 0x8}}}}}]}}]}}, &(0x7f0000000600)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x99, 0x1, 0x81, 0xbf, 0x8}, 0x81, &(0x7f0000000200)={0x5, 0xf, 0x81, 0x3, [@ptm_cap={0x3}, @generic={0x76, 0x10, 0x1, "c6117b521bdfa4d601c43c1053bf4a83bdfebf373e0c3e20397c063b0db8b555bceb329fb824544dd35accd78b87be196af2db9789963007de8bfb44b141dc9c35fe5d029555a89e9dd44be14d7e38ba5503681096708077d4482aebb6e7e4c590462965a3f5e1a65b045ae8b788cf21ba1731"}, @ptm_cap={0x3}]}, 0x9, [{0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0xfcff}}, {0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x411}}, {0xc0, &(0x7f00000002c0)=@string={0xc0, 0x3, "2e8c1de68927013d137ab2cd7181a748d3682b34d7a66f298d6789c0003dce69325f1a91d589b30e60d80f9f0877dae2c33bb4456769828390e050fa9899e401ed301cff82742a8266779e1b3e4cb3b4306034d10e7964a5d0405d63e2ec60b892dc282ae2b4e769d0e4021ffb7441ce81349da0e813999dac6943508fc36ffe76318646c1fe57aad988c5c2e3a0d22f18114a92fb95d4f72d75b722c63203b323d56f756648d9324d225c69c832d2108c0d55ef892a7ca816d9ed5e8c61"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x340a}}, {0x72, &(0x7f00000003c0)=@string={0x72, 0x3, "8c1ed9ba017383422029ff47afac2088ccdb0feac279adb8f935b3024d75215d4751eb11d00ca0b8ef1e5ce4516d669f9cdb56ab5a164d15ffc1478929e8c8c5043c571e0e37d0f45bf82531306b4b69e3e88ed6b6a9495e3bb19fa5a7f7c680726835e32c2df03d3d2602f6f41a38e7"}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x2843}}, {0xf1, &(0x7f0000000480)=@string={0xf1, 0x3, "5abdf5be0be1560593c0b540dff63155b5ca404e4545d0f1e76aabeef69476b8db52e592434b4b6d9bd445970ac27a08f147eab687460d923e6eaf2bbf080e60804d525f34205258740a86ba5fbedb8d680bde8882007ffa183f5ceba19efffcd1e8509b5b2a574d06a9d1ade52bce4cae7e189a5366ef016b1856a0f82c5221be6f33d8f7e4630b3bb5a449299d9a2cd6e1175944e466109a6ef6a345ca9a4728cfb8cdf1763cee0f062b771933838bcaf561ed8b4aea336fd92b800a8fb7ee34f14754f38bbd8b3b6ac464fa039959b464e06f922f44077eafa305bee7509e6c272ac03283dc8a5b8fdc8c10b991"}}, {0x4, &(0x7f0000000580)=@lang_id={0x4, 0x3, 0x43e}}, {0x4, &(0x7f00000005c0)=@lang_id={0x4, 0x3, 0xc09}}]}) syz_usb_control_io(r1, &(0x7f0000000800)={0x18, &(0x7f0000000680)={0x40, 0x6, 0x65, {0x65, 0xe, "c4948fb012eb81dbf26a7d06d1d32ff3ad68b2fcfe9da8797a1c766110f81277b795b386458544acd520d521a9341ea7a9caf2e3d40a266accae7615c1fe907cbaa0a844823a837c33a3c683f771fd587afc27411d3c3fbd540ff95fbe109c480581eb"}}, &(0x7f0000000700)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x424}}, &(0x7f0000000740)={0x0, 0xf, 0x39, {0x5, 0xf, 0x39, 0x5, [@wireless={0xb, 0x10, 0x1, 0x6, 0x2, 0x30, 0x1, 0x0, 0xd7}, @ssp_cap={0x10, 0x10, 0xa, 0x4e, 0x1, 0x0, 0xf0f, 0x1, [0xff0030]}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x2, 0x2, 0x3f}, @wireless={0xb, 0x10, 0x1, 0x2, 0x1, 0x80, 0xb4, 0x3, 0xa6}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x1, 0xe, 0x84}]}}, &(0x7f0000000780)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3, 0x2, 0x8, 0x1f, "27916b7a", "e17782c2"}}, &(0x7f00000007c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x2, 0x0, 0x6, 0x9, 0x20, 0x3}}}, &(0x7f0000000d00)={0x44, &(0x7f0000000840)={0x40, 0x1e, 0xc6, "640aac0631bfbd5d3d411cbe780ff3a8df7a0784792a0d198a7833869345868d714a3384c8f2aa3d63e31c1985b0961a6ce8a0eeebea79e946dd8e7c2923d1f83b407e3d0a5a6462b59a774db893b4e42e9af03979a2d0a9337675d5d5327c3f2d07b9e831c08ad987ae5666f8db2c18a60126f6ee1d00947ce490eae5ffa21262aa437e3b7b15f9e2d1e7d19a33d495312cf4065760879558091465499f2995ab83942615ece63e75cf336408b9e74826ef665f065cfe9606a8f09a76bf08a24a8c56f99d69"}, &(0x7f0000000940)={0x0, 0xa, 0x1, 0x1f}, &(0x7f0000000980)={0x0, 0x8, 0x1}, &(0x7f00000009c0)={0x20, 0x0, 0x4, {0x3, 0x1}}, &(0x7f0000000a00)={0x20, 0x0, 0x8, {0xe0, 0x80, [0xf0ff]}}, &(0x7f0000000a40)={0x40, 0x7, 0x2}, &(0x7f0000000a80)={0x40, 0x9, 0x1, 0x80}, &(0x7f0000000ac0)={0x40, 0xb, 0x2, "1d24"}, &(0x7f0000000b00)={0x40, 0xf, 0x2, 0x3}, &(0x7f0000000b40)={0x40, 0x13, 0x6, @link_local}, &(0x7f0000000b80)={0x40, 0x17, 0x6, @remote}, &(0x7f0000000bc0)={0x40, 0x19, 0x2, "1cf1"}, &(0x7f0000000c00)={0x40, 0x1a, 0x2, 0x7}, &(0x7f0000000c40)={0x40, 0x1c, 0x1, 0x9}, &(0x7f0000000c80)={0x40, 0x1e, 0x1, 0x40}, &(0x7f0000000cc0)={0x40, 0x21, 0x1, 0x1}}) r2 = syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x5a, 0x92, 0xcd, 0x10, 0x10c4, 0xf004, 0x1118, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf2, 0x0, 0x51}}]}}]}}, 0x0) syz_usb_control_io(r2, 0x0, &(0x7f0000000780)={0x44, &(0x7f0000000300)={0x0, 0x0, 0x1, "04"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r2, 0x0, &(0x7f0000001740)={0x84, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r2, &(0x7f0000000ec0)={0xc, &(0x7f0000000d80)={0x0, 0x30, 0xc9, {0xc9, 0x22, "4bc79be9b6deb8b8b7c59687f8c90b66a340a52af0ada4b06722bc605ca4ba4db73a4000c23e7a65c123a0d25f5a0df37773db0f1f5f9c280c336d0823f70c1843f91013a551e8056ace4c86c4a90d90b240a594e1a8416a785eedecc8a5493e9a1b5d6aaf2cb92f7cf6f9d49b08af4eda6f6e3b7c4c373bfa1d824a12f6511dd1241fa53796cf93ecf952df2cc115c385fa13b44275773d27239c57afa912e9f29066fe49c579da4122134dbb0ae68347d5f0b5cc390080225e9ba2c5909d6a14d8d296b52dd3"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001180)={0x24, &(0x7f0000000f00)={0x0, 0x8, 0xae, "c2e8a266dde85d03828241ddb7568e40b061a5913181ae0d0039e86ca1bd5c8d906de765f66503c2df9caf89b4c5f51bc1ff1d39235a8ac6922c32a08cddf205192a8051f275e54b137ff5fa2b1662f5351de9c1b1e16f7141545c8647a6a00c995918879bce4b4601dd506498ce4400dfe2fd55fea018ae3cd244917b3228cdcf7fa48979d7023cbfb3fe4bcdb447a241336e06255b415d25b5852389d6cd79d02d87853c210a10987fb24e1535"}, &(0x7f0000000fc0)={0x0, 0xa, 0x1}, &(0x7f0000001000)={0x0, 0x8, 0x1}, &(0x7f0000001040)={0x20, 0x80, 0x1c, {0x5, 0x1, 0xffffff72, 0x5, 0xbd, 0x5, 0x20, 0x4, 0x54ad, 0x9, 0xff4d}}, &(0x7f0000001080)={0x20, 0x85, 0x4, 0xfff}, &(0x7f00000010c0)={0x20, 0x83, 0x2}, &(0x7f0000001100)={0x20, 0x87, 0x2, 0x589}, &(0x7f0000001140)={0x20, 0x89, 0x2}}) r3 = syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x5a, 0x92, 0xcd, 0x10, 0x10c4, 0xf004, 0x1118, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf2, 0x0, 0x51}}]}}]}}, 0x0) syz_usb_control_io(r3, 0x0, &(0x7f0000000780)={0x44, &(0x7f0000000300)={0x0, 0x0, 0x1, "04"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r3, 0x0, &(0x7f0000001740)={0x84, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r3, &(0x7f0000001700)={0xc, &(0x7f00000015c0)={0x0, 0x23, 0xdc, {0xdc, 0x5, "3236444befad4d39e30efe68adfbbb0bcb34265939b783f2d204d5e03199d387f36827d4890556e3af78a840605eb587caef9754a389b02b4ce70968e48f272db221c256d4386edf7e52e8249e840049939c3075007bb19de676d0b7707e26a0eda1343aea02dd7bdcf5da0f39ffaf88c35577e90706c583d6a9ae2f35cfef011ec08afe3fe783672d6d1f754d3359efa5434d6a467f47b9ca0a7e9a82bf66f843709c1c47f4b03a432db1a940d57b7cb112ebf6f3c6b57a39b0c9ab4b48a7b5ce31ec4cb39766c8c2ff69e4edf4bfde637635ddfa627ff93ada"}}, &(0x7f00000016c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000019c0)={0x10, &(0x7f00000017c0)={0x40, 0xe, 0xbd, "23009e99840a617717163ceb4edc9fa8128dae4c795987b39ebf89e38b25d66544559be31dfb0ba8cec0fe215317983e503d3de174aab1d9d8fe1ec823eef19caa63187013f38758d41afb4033254540018d318c72252be2c258610459a5d8ef6ae40bbd736340777c83ab4b02575cbef7e1093862185819a62dda612a3585579bc4bbefb1e7cc097acb5a8acd2d6403b3c738ad9610c745ede1b24cb411bebbb5e9eecec4bf450d4a8eac36a49cd1d0b968a34a084086bb26cd9789d2"}, &(0x7f0000001940)={0x0, 0xa, 0x1, 0x2a}, &(0x7f0000001980)={0x0, 0x8, 0x1, 0xd7}}) 09:37:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x6e3f9c29) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000001c0)={0x1, 0xb, 0xda8b, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_control={0x2, {0xd}, 0x9, 0xcf, &(0x7f0000000040)={0x1, 0x1b, 0xff80, 0x8001, 0xfff8}, 0x8, 0x8, 0x2, 0x0, 0x3, 0x401, &(0x7f0000000500)="708c678e5fb51a74a17e33aa2d26fba94f8df91dfa5cb0cb23fa871a66009c0153455943fde3f2b589b7c184a890c056fafcb410418c54cd968e8f53310fe3f09cffb5cb160f7296415261a5eee8e7e457c2a6543073b512a74f7200afdcf0e2e9f9d53d40aa59d1f4cd0d14a4489261f1cfe7c916fe39463cad6e4a03b6d9dca70e1c56117f9fa523cdd75769448d9ca967b63bd393381792d43b6d6b4653239f0bc73a3f01f6e1078458bb039df0612e918c990566cc9a59eb377e194434db4e29f964469a60ee2c19feafcd1e17bda38d6fe8e794634255d0b882fb6697c3e6034971e23906ca079f4f09eae939f6ed1e3ced4beada63041e445c61f3de29bda5ff11ddbcf13b60f80d531345979800ad669b15ce37e06d789f324ca255543def40673127721aaf1fa9ecc6d9620e217a9caf7f6d67e0f2a0ad206663847b0e385da0bef6b96fdf0331c111c250ae85d07debb5eec07d15604bcf973ca53e9df9699b7079a74adaea5f2aa71fb56bb0d62f1b816a4aa1eb7bb18f5b1f5d05410963dc2b84d12e020cea14a63812abeea6af746b7e54fc720a344581ad790f3058866d28a7953b82f924d2f9dce94d3602846d97827ac807942b9901d24251bc8d38b51921ac54e0c3dac70332fbbbdce670c53dedaf8fde682a4f7dea737b4e1d8f7b8ece96439a28227119e2ef1d6df507843bd0aa13e9032410db1f93b089365e029d5827adfa0c027f447a7f6ce1801ad5cb9a1fa6ab5a143cd6a9d7151185100ae9f0e2e76194cc538148e6326edef7ef19e8b93234adc38203793e6819ae7c56b0d3168031ab84a29bbed3516bf06db8e607462bda2710676dd950c03bec5fdda0cf6262fc480b79f692e6f5cc961764f82144cb456204c62a432108b00a192cff731fd459ad005a1f1c765802f51aa468805267bc915f1b248a28aeaba471c684dd15954ed4af232e6892d1d2d7acb7e0deb93d8af5fad4aee9bfd2470b3fc417f1546e9515a9cfe194343320a3564fb35268e9024e0ddd7ddc0fa2c9f83d8244dd92d35db5bf93940b861ce30459620ec7e52818d5968eb86c058e283430468631b2b29742bf28adcb81c24216d063686af38098328b1bc37956ce95dbe5616f2b894bc0aa0ae15aed677aa2806ef79e4c3238b81916c7ba190bcd36b750d92920b2c0d183b7ae6b3c6f2c86559cc7418b361a9e7608e6957ae790f76b014a75d842a723e87b24ad0571506ea18874abd8b0cfda9b7b571b4be723e40dfe498c6a3bf4ebee4fca9f8d5142824db9999a6753117406cd67bda39784915f95d89a22ef316bee5371de7439ad7f288f26b4445b2af69aa4465fd4a72fcb3b731d3088289427ea1fa1f3635470a97627c02f619240ea47a404ef3f9a753d837f82d385816af6ec63b4169088fe48786ca80199da05dd91fb41400e1ab77469728209a40268213ca88f6aa1b93b90ada2c7c901faba46c3dcc0faef1d3d4f7acce98515bed34473fa8e4ebe3432b406a0234e1fbb67b3eafa88ccce69b69831fbfcc63490cd60db8b2fa9a93679c23d3c8caad4339cc4f69492cdffedf962e458392068383127a0f54c6015e6c9111240cce5947eee02372451ce841a83d67fac71648ebf1163a7effca0027e5502dcfd1831459d6fa2af715243ddf56bf0fea46a6db1e785bdf9a9682591f50375fe187ce0e14dc9597c55c14a2e357499de0530f617a6587201139ad945ca74c6e29f6b3e75536df72bb04ae5156c057ac2a326334e35ecedeba1c42065989c6b5728e80225ed3dfc5508873e3e3e33a2b93ff086162e28da8db42aaad3dfed8f20215260c3e18d5d1c10577929740047cf72b9b81d708fcfef93bd542e233de1a6c9803bedfec0225150786b5d61fd2af288e501e1f3181d737e8f9353ea4cbaf1930ac3ac5da8a3f669449baf375faef284c3bd5d87cade831e415e4ec12f103248c0a314e9d164b2bcb9c6b7e37ba5f673b0f86edf3f990c197f3f35ffbc0344764bbe97c6782b796ea915accfb40d53b62738e3056ef3595ddc8fb3097cc18cc6e5f5a4cb85fcc5df3ee20d22ec6e76498d54238871b1d4a003c6bc7fa3162253b108a6e781f4ed582ee6c069af81c42b2bd6796a3f5c46f64fd73657ee52335c3e8d8760aaf2bb525e68b8ea29fc002fc30bf157592b4fc7e6fb77ecbe5c31e0f335e14025c27ed413fe5202aa28023d51db885809787dbd04bbcd9a1d776e90a11b4b5d5ad774f482fdeea360c161289d05bd57f4ac85066708f45ba976979a8a7edbe6d0aa18b4bf9dae0a5eb62c739daec6147ee54b86d3e655eac70c50ba4ec5b817cd8dbb4418317c8c11aadc1bcdd662e82d445e410a78fae998814519c1cfb3d5922a9495e54da8eb97eeff413c804f652753b6a918524c2591f24adf60fb6b7fc96487ec2bdb7cad6b6119c6e74d2ed5f326f1124054c9d633feaf432e21d3118aa9d6266f87e03f5522c394b840c8b84a28e3eaf93064166b8b7fdc5c7173e90deecd98392ccda248edf79ec9ef740d1ea39b2377f05dbc5f28147d10a459bbb1d58110111530ec869c6262d60bdb39b326d618ae59c8c6c88dc86e7cc72ef64f3529c7a31927d214e01a95c3f050374b45783815e7958b0eb7ea492ac3f2fa534ab40c44a54728fe62b68820a0ad03c05e5e425f927d9b9a7fd77fd3619054729bf6a3fffd5a5631977f09726b3547e7bd2079984755ba6db7735d57bad5220a7f95d6ac68d9f8148a0a2b1aa2c2ccf306a823293837f5a689810905e8ddf8091ebcfb44c789abd384770e9dbe82365e4d83c94b799dacbe9ea9da6afb37ff3aa5e2aad8f738447b29715f3b9c0013ab97c25665a4869c439a990e53500640e3c4978c00a5001924be41a6153f76e2dd674baa28ed364963d4b3dc936ebafa09e383da0684124a2ad671a1d2332cca6d867684d6cd95d403a8ef146a7cf25d2ea17f05ff6ec277488db8f444f5326e53962b789fda711625483d58224b50fb2a0697d7a0cdd2bf870fe7ad551b1a4b26a3119b07bc9205853043a9bd02e1d2c63f327241b19428c49cbc295a5cb999ccef58fa5ecd9778cea0272124bec9901f5bb2a37687eab57bcedf11621412cacf9085fcdea0c4826fac2594aaf58993760bba68c1d74396abd3fc1fb8cbfd5cdd55a490e19ab251b8233ec5d355d550c319919bfbc806ae569bba76b0cce4644398e7ed23d3e0d0c6c143332fef72933d3f2ca8a40e901d8a42dbd68fa2b52d939a6dafdf4ccb920b6e9ea2a280bf404765537786a49ba1aa7d9b9a2ac244ae20fbf6c32fcf5b4548da199fc2a545b77443ace50cb70ceaf6c63ca75432353d85118b783563852e03c76a1565b7df3f5c212f65a56c7cb9031ce6074897596f9fc62a0ec7fe8a31e79b8df751aed6cc21a8b323b138a918a1e79219b5993c95f99c58e1cc0a775db58d0b39f1895309cef5b6fc14859fac59e935eb1175f614d69794c78b0c13f96c661809d4550f6614849ccaa126c9c2e52534463558f94af1d54e19fa3f73dd158353d08048206ff7d3f8a48e3bf1e4e8372db131099dbd0ee4922ae250827366caf8123186efeee3d86e9356fccbf55bd0ed5ed6f2bb6699e66355e0dc0336a60c4ce0bf6c9abe4c5095b27669f89e16837d3b6025b61d8dca2e9ff1245059405357059661c17e5303a6cebb6714d66fba39553cc3b8f04f379a128a925350848fd58ff75b7218011c9e8c1e367ca9ed446e7f55dc99bca6a8cb5753dbb5e08db7f97a750391635222a13193d948b407583c5f2b7e784352982d8af0460cacc091fcfc96a7f66a3678a1574f8e82c0ea6e814f2f23f7a6a0fa6e56d6859bc5f5964158366270201a6d6f35955dcb9a0954136d25efa135092620a487332b4ef229cff248162bc089244890cb8f67387ad2adad2d3ae1ec5e50ce567126b4c0840f59516ffa99bc19c18709b1cd06fe4245db5b264450be7e69d54d341a7f3aa1806498545f853171544e242d2472af0aa32c04acbcc87813f1e0764d29bab0c25448519036767a371e662a67f7d2a7f4faca08d17ac605163af1c9a19c37da98b2ed6944af57f6307cdf3e201ab0de9260656432ad8906b26fcc7dd9eac888188be710ff151de021fa1f51fbee7d605d2952233db9b1b25e49e6d001ee1f918f21f8ff057036ec87fe7d3941fd310373fd38502ecbe47c7cc2f1d7bad5bd85885484e6070e6254c7cf5f14c2523e9fe1db9d89f090d10fe7457c36341f8fb336964b641bfbbbc3debd49d2dd304ccd358442848b85ab245ce105149a43ec1dc5850b9e378044b0e2154ce3dc11d20da9bafa6ac7660f6f53ad881215c5c773645a4eb0b136aa65431b337773fddc655fd5c699f04da97707c06e4963a10188335d74ad4ccc2bbf4c0b956eb23f0da3e8ef067a5a2df3855eca49487be96a3871ed0cfc8ec169aade85ce47c66d9193aa8611c35b0015f1dc93d1c01a235157ebde4024d1cd6cd556482243e7d189de0b96c64836b633aaab509a10754c48beb4b52ee885fe3705b60517a13815c58e4bc87735c3be608523221107cc954db692498d30aba1e4e6991b4e0f0e377faacaf6d3d9c3a0cb09fc9326b3f07732cc56da56128c82f32432897610107cd4970c73f576e3943f0e5b0b483a19e9dd0d5e3181d92b82f0e29dfe3855a31c03d78b46d43ac12e26e4ab516b226978d6c7a4ea1231cd38872addc3e31d6fe15fd0c777c8749f536cb48b64c0bbab9f4bcf8e2ec80fb01c0d339c4f5039d8cbd97c5ae00aa2e82eb98a101b62079566ff91b241417674f3e90c46e6d3fb1681e8ad7e4d493340de7fe813b3d2036246a833130f1e6523e03287462bb8ffe48dd35bfb17e2ede199467fc637be6f6ca1824b3354e7577eac316ac9117b010748f43db97ebe00634b044d3fa7cfb93d70f05e413932bbe41bb49001036031227c74e017f8aec0dd34a79655659928fad6bf9735b207d3eee081ed031ce422a16ed790f6a9fe93cc3e34526d185977fe300e63b80473fae71981c70dd9458a374bec510b9782afa50ffe6da48ed6f32a60a28b2b0f2ddb492482eeb30a662d75a817b8a3417402c19e476e6f5af9173dff95956713dce46f5b164a72d5369debf76c8153d1b353955c406a14a164eb7cc5e89e01667e41222cdf9ca05cff3e186774a84badac08dc83633dbacef8e9c0ddf54c08cdfdfa69eb43c303472a46003fab0808daa90fb2cd583948b4741ca0e61506b86fc52fb90d59928b5ba671ae79446b3b39ce418472318f35135af7eb7281662ac67b4cc1ccf5e2d30eef9527cf039ae452fd8dbcfa0d9124d3c37b5573d460be571d7f8d4a09fede77a880fa83b4cb2dfcfa3d8a218b2c3e9d2d5a6fea2c8b45259283920343ea5885ba928dc3be5a2c2f3a36b8479fa5e91ee0112085017f9b98c72d5189f69888f39ee42aa90a6d82ffe9f17c152d7f81dabd56a5a7756e93fa540184b5c37af7e56a0a941196a1095c8ac078af697256ba0f4f86c904cab3d4aaded6853ede694df70708809c73e4d6a1407049118aed0b7f68b7ee2f18935ede794063ad40009eec68cb1faebcc4d0419d4dd69fcf27c302d5e54c0e3a37d0ea592bc000f48899ee4ce7796270e6c311ad5d739769aeee633bd8ae0bf7ac7caf43356e7f7876080e7079d41fffb374f9bc2b41b50995a51152dccf0217aa03b7206dee8253bcdcd3a70928cfcf78a145ff19d4c9d0359de714227ccee81f155379eabb8c553eb99f35a36327e60a"}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:49 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000080)=""/4096, 0x1000) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='I', 0x1}]) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f00)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=r5, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYRESDEC=r3], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000480)={r2, "8f77544f767e704583ec6742b1e08d00"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000440)={0x0, "897aeb27205a87b454d84cfc49bd188f"}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000001440)={0x14, 0x0, {0x9, @struct={0x7, 0x1cf653ef}, 0x0, 0x401, 0x101, 0x7, 0x5d69, 0x5ad9, 0x0, @struct={0x7fffffff, 0x6}, 0x1, 0x1, [0x7fff, 0x7, 0x6, 0x1ff, 0x100000000, 0xffffffffffffffb7]}, {0x80000000, @usage=0x7, r3, 0x101, 0x8, 0x1, 0x0, 0x3, 0x55, @usage=0xfffffffffffffffa, 0xff, 0x5, [0x7, 0x7f, 0xa6, 0x4, 0x40b0, 0x3]}, {0x7fffffff, @usage=0xfffffffffffffffa, r6, 0x81, 0x4, 0x3, 0x6, 0x6, 0x8, @struct={0x9, 0x1}, 0x6, 0x1, [0x100000000, 0x8, 0x100000001, 0x6, 0x5, 0x2c]}, {0x5, 0x3ff, 0x2}}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000002080)={{}, {@val, @max='max'}}) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001080)={r3, "9d11009616acce00a244daacda193c83"}) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0x7fff, 0x4) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) [ 252.373523][ T9486] usb usb9: usbfs: process 9486 (syz-executor.2) did not claim interface 0 before use [ 252.401264][ T1985] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 252.410109][ T9486] vhci_hcd: invalid port number 23 [ 252.415386][ T9486] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 [ 252.452067][ T9488] usb usb9: usbfs: process 9488 (syz-executor.2) did not claim interface 0 before use [ 252.465518][ T9488] vhci_hcd: invalid port number 23 [ 252.471739][ T9488] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x6e3f9c29) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000001c0)={0x1, 0xb, 0xda8b, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_control={0x2, {0xd}, 0x9, 0xcf, &(0x7f0000000040)={0x1, 0x1b, 0xff80, 0x8001, 0xfff8}, 0x8, 0x8, 0x2, 0x0, 0x3, 0x401, &(0x7f0000000500)="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"}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 252.648555][ T1985] usb 1-1: Using ep0 maxpacket: 8 [ 252.768829][ T1985] usb 1-1: New USB device found, idVendor=12d1, idProduct=79b2, bcdDevice= 6.27 [ 252.778860][ T1985] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 252.830175][ T9497] usb usb9: usbfs: process 9497 (syz-executor.2) did not claim interface 0 before use [ 252.866500][ T1985] usb 1-1: config 0 descriptor?? [ 252.868304][ T9497] vhci_hcd: invalid port number 23 [ 252.876858][ T9497] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x6e3f9c29) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000001c0)={0x1, 0xb, 0xda8b, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_control={0x2, {0xd}, 0x9, 0xcf, &(0x7f0000000040)={0x1, 0x1b, 0xff80, 0x8001, 0xfff8}, 0x8, 0x8, 0x2, 0x0, 0x3, 0x401, &(0x7f0000000500)="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"}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:50 executing program 1: shutdown(0xffffffffffffffff, 0x0) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000018105e04da0700000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000000c0)={0x24, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="002222000000962313275547963007010000002a90001e08000b3088b6a10b0200080081"], 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000340)={0x14, &(0x7f0000000140)={0x20, 0xb, 0xc2, {0xc2, 0x11, "38e20352d1873e73a1b3e333c69da7df6d966f5e54f3e46286712e8537dffbc8340341e7d25ec58341214c6a95a54bf4d1ccc1e15a64e9858ff10b5eb81c335f9c6d5ad7800279f8fc10e240222ecc97d6d4e975574bc864f919b6e4f3bb1cc0fca7ce5cd56cb9540ed15aa81f0d32ca6e375114cb64eef0fce5aab154282a5ef2fb63fa01e0cbd7e8fc95e8c43221935559ddfeb22615890bc84f342bd6fc5c936c75520f33965c7db9a1fa1af30cc7fe96f12603a0c530c39a95b5e8615dd3"}}, &(0x7f0000000240)={0x0, 0x3, 0xfa, @string={0xfa, 0x3, "2741dd59890540bd28d0b89269ed4f9e52b57b90a94aef4b9f80a9d845a46e992c67e688c2961b1dce3239c1f0bb5ab719cb74257855547735d724356387e9861146faee4faba5480eaed53b0851bd106ee63416c487b03269e73291759f10952b8452f984c2637653bad9b27b47a94c35d563787fa2fc18a02f44b403c213a0ef85fb61a77f070c3e8d05f09f2b0f52cdfb48ef6892e6f317132f6e2d7e2bbf31dfa0919c0ecb8e39231465efae9c4dfb13a9f91ff3829efcf8563bae34c786a0c3c502538bef0c5c7439df4d3265e888d27994499cce9174701eb1815d027140675409b2caaa1ef5d07561f82e2925cb516799d3e5ce4c"}}, &(0x7f0000000000)={0x0, 0x22, 0x1a, {[@local=@item_012={0x1, 0x2, 0x4, "e1"}, @local=@item_4={0x3, 0x2, 0x4, "c099d6b3"}, @local=@item_4={0x3, 0x2, 0x3, "3ea6062e"}, @main=@item_4={0x3, 0x0, 0xc, "c84418a0"}, @main=@item_012={0x0, 0x0, 0x8}, @local=@item_4={0x3, 0x2, 0x9, "4647b1de"}, @local=@item_012={0x2, 0x2, 0x4, '+m'}]}}, &(0x7f0000000040)={0x0, 0x21, 0x9, {0x9, 0x21, 0x5, 0x48, 0x1, {0x22, 0x4}}}}, &(0x7f0000000600)={0x18, &(0x7f0000000380)={0x40, 0x14, 0xc9, "fd9f2e76b40977995b04fb6df8618eaf384cef62d013426c063111c67bc55c99a13effd98fc5e8f3f1fc9691409dfbd29b58849bf780c6dd8bd21ea3946611bf2246ab89025818a7d680fb127e55cb46898928eaf1ca23fc908e2c6f2553b70db1430b40bb11a73a24b3676180cf8a778abffd5e0b47f39af7b54e3aa4606dc096bd653ab5cd1c2f550495de206038f37c04db7e07d1b185173be3c886637673d17566135f481745ecbebbbebfec6ccd9684ccf747f8e89e847bcb370a6206f53a5aba46a223eeb973"}, &(0x7f0000000480)={0x0, 0xa, 0x1, 0x10}, &(0x7f00000004c0)={0x0, 0x8, 0x1, 0x46}, &(0x7f0000000500)={0x20, 0x1, 0xad, "be6b93402fa90eb1f899753c71a09a5343b47368466914ee78e02d69816742599f957a0ddbf3722598e18db70b02bb5dcf0a012a1b6d60b076fa33f3121ec7e11edae304af81c7870677c9558c4258c06915073eea4cadafcbcd39b1026b7dc557618383cec16bcd89f665ee21fea3f58dead42398996562b4d35f5122b6d076f7d46d43a129572fa5cde510317eb16b87fb3615be829845acb0d249778063a970371c5d7dd7108d7a7571c5b6"}, &(0x7f00000005c0)={0x20, 0x3, 0x1, 0x3}}) [ 253.117726][ T1985] usb 1-1: language id specifier not provided by device, defaulting to English [ 253.359160][ T1985] qmi_wwan: probe of 1-1:0.0 failed with error -22 [ 253.375711][ T9505] usb usb9: usbfs: process 9505 (syz-executor.2) did not claim interface 0 before use [ 253.417421][ T9509] vhci_hcd: invalid port number 23 [ 253.422652][ T9509] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x6e3f9c29) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000001c0)={0x1, 0xb, 0xda8b, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_control={0x2, {0xd}, 0x9, 0xcf, &(0x7f0000000040)={0x1, 0x1b, 0xff80, 0x8001, 0xfff8}, 0x8, 0x8, 0x2, 0x0, 0x3, 0x401, &(0x7f0000000500)="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"}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 253.687495][ T4694] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 253.869603][ T9513] usb usb9: usbfs: process 9513 (syz-executor.2) did not claim interface 0 before use [ 253.908783][ T9513] vhci_hcd: invalid port number 23 [ 253.914106][ T9513] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 [ 253.931604][ T9515] udc-core: couldn't find an available UDC or it's busy [ 253.938967][ T9515] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 253.949773][ T4694] usb 2-1: Using ep0 maxpacket: 16 [ 253.999941][ T9515] udc-core: couldn't find an available UDC or it's busy [ 254.007986][ T9515] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 254.090798][ T4694] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 254.101966][ T4694] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 254.113370][ T4694] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 254.126711][ T4694] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 09:37:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x6e3f9c29) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000001c0)={0x1, 0xb, 0xda8b, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 254.136055][ T4694] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 254.154990][ T4694] usb 2-1: config 0 descriptor?? [ 254.415511][ T9520] usb usb9: usbfs: process 9520 (syz-executor.2) did not claim interface 0 before use [ 254.449097][ T9520] vhci_hcd: invalid port number 23 [ 254.454433][ T9520] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x6e3f9c29) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 254.637215][ T4694] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 254.644663][ T4694] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 254.652382][ T4694] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 254.775345][ T4694] input: HID 045e:07da as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:045E:07DA.0001/input/input5 [ 254.841893][ T9525] vhci_hcd: invalid port number 23 [ 254.847629][ T9525] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 [ 254.891428][ T4694] microsoft 0003:045E:07DA.0001: input,hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.1-1/input0 09:37:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x6e3f9c29) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:52 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') [ 255.205331][ T1985] usb 1-1: USB disconnect, device number 6 [ 255.388332][ T9543] vhci_hcd: invalid port number 23 [ 255.393649][ T9543] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) r2 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) sendmsg$nl_route(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000000)={{0x1, 0x4, 0x2, 0x37}, 'syz0\x00', 0x23}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x4) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1a) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000002740)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 255.875114][ T9548] vhci_hcd: invalid port number 23 [ 255.880546][ T9548] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 256.048082][ T4694] usb 2-1: reset high-speed USB device number 4 using dummy_hcd [ 256.217029][ T9551] input: syz0 as /devices/virtual/input/input6 [ 256.248016][ T4694] usb 2-1: device descriptor read/64, error 64 09:37:53 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x72, 0xa1, 0x9e, 0x10, 0x4d8, 0x82, 0x1886, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0x1}}]}}]}}, 0x0) syz_usb_connect$printer(0x4, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x40, 0x4, [{{0x9, 0x4, 0x0, 0x1d, 0x2, 0x7, 0x1, 0x2, 0x1, "", {{{0x9, 0x5, 0x1, 0x2, 0x40, 0x2, 0x2, 0x6}}, [{{0x9, 0x5, 0x82, 0x2, 0x8, 0x5, 0xff}}]}}}]}}]}}, &(0x7f0000000280)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x250, 0x6, 0x3, 0x1, 0x40, 0x2}, 0x136, &(0x7f00000000c0)={0x5, 0xf, 0x136, 0x6, [@generic={0xe9, 0x10, 0x2, "3f7597e0ab10bcd0bf1f1bf330af0903bfea2d14da1166817635f63a99eaadc445f53711062e55812ab6aa074449af55359074503ecbfb2af58c5cc2ba2a1878b3979c8cbebfb961e37cf667c5fb71ca35c0fb4b86ddb95d4cb712905ef2e18fcbae886c463db96ea92272492e6b873643efe3d33e6fbc1992e303042c3758493e95f59b3532f3b2c98536e09f6ccb68388a74d82602ae66e538f020186f2b88243218dc8f8c2d2fe94e65dcf605eced49ef78ca9d272adb91f108aaf6924e062a62b5cc312a776334b3c28028a3ec8389ac1e7ab33d37d496387fa3d73c4e0698cfb931bef0"}, @ss_container_id={0x14, 0x10, 0x4, 0x3, "fc1982ef42d31b4631f9fa71b218d20d"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xa, 0x1, 0xff, 0xfff}, @ssp_cap={0x1c, 0x10, 0xa, 0x1, 0x4, 0x8000, 0x7, 0x372, [0x0, 0xff3ff0, 0xffc000, 0xffc0cf]}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x7, 0x4, 0x4}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0xa, 0x6, 0x400}]}, 0x2, [{0x23, &(0x7f0000000200)=@string={0x23, 0x3, "ac54cdf6220f9aea396abed24f56e3ed797090b78a2944faa29c09d4e1d02238ac"}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x40e}}]}) [ 256.630953][ T9561] vhci_hcd: invalid port number 23 [ 256.636204][ T9561] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 257.257485][ T4694] usb 2-1: reset high-speed USB device number 4 using dummy_hcd [ 257.333930][ T9570] vhci_hcd: invalid port number 23 [ 257.339536][ T9570] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 [ 257.348624][ T1985] usb 1-1: new high-speed USB device number 7 using dummy_hcd 09:37:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) r1 = syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc00c5512, &(0x7f0000000000)=@usbdevfs_disconnect={0x4f13}) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 257.507657][ T4694] usb 2-1: Using ep0 maxpacket: 16 [ 257.588303][ T1985] usb 1-1: Using ep0 maxpacket: 16 [ 257.591555][ T4694] usb 2-1: device descriptor read/all, error -71 [ 257.709023][ T1985] usb 1-1: New USB device found, idVendor=04d8, idProduct=0082, bcdDevice=18.86 [ 257.718486][ T1985] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:37:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x401, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r3}, 0x8) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x77, 0x8004, &(0x7f000005ffe4)={0xa, 0x4e25, 0x0, @loopback}, 0xcf) close(r0) [ 257.790872][ T1985] usb 1-1: config 0 descriptor?? [ 257.833656][ T1985] ims_pcu 1-1:0.0: Zero length descriptor [ 257.839842][ T1985] ims_pcu: probe of 1-1:0.0 failed with error -22 [ 257.892943][ T9577] vhci_hcd: invalid port number 23 [ 257.900067][ T9577] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) syz_open_dev$usbfs(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 258.034899][ T8447] usb 1-1: USB disconnect, device number 7 09:37:55 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="1281000053050057c80a01c030fc00000001d6713180084009e611000180000000090400005f037b1fa34dbb1899abff"], 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000bc0)={0x24, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) [ 258.360835][ T9587] vhci_hcd: invalid port number 23 [ 258.366147][ T9587] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 [ 258.422171][ T8767] usb 2-1: USB disconnect, device number 4 09:37:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 258.832106][ T4694] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 258.855920][ T9607] vhci_hcd: invalid port number 23 [ 258.861621][ T9607] vhci_hcd: default hub control req: 0000 v8000 i0017 l0 09:37:56 executing program 2: ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 259.079295][ T8767] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 259.087555][ T4694] usb 1-1: Using ep0 maxpacket: 16 [ 259.218028][ T4694] usb 1-1: New USB device found, idVendor=04d8, idProduct=0082, bcdDevice=18.86 [ 259.228900][ T4694] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 259.262161][ T4694] usb 1-1: config 0 descriptor?? [ 259.308417][ T8767] usb 2-1: device descriptor read/64, error 18 [ 259.320630][ T4694] ims_pcu 1-1:0.0: Zero length descriptor [ 259.326616][ T4694] ims_pcu: probe of 1-1:0.0 failed with error -22 [ 259.518445][ T8438] usb 1-1: USB disconnect, device number 8 09:37:56 executing program 2: ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 259.577762][ T8767] usb 2-1: new high-speed USB device number 6 using dummy_hcd 09:37:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000013000100"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140003007665746830c83fb7c911b55fe22ba45f746f5f6873720000000014001680100801800c00"], 0x48}}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = openat$proc_capi20(0xffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000180)=0x401) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x48}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r6, 0x0) preadv(r6, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 259.768423][ T8767] usb 2-1: device descriptor read/64, error 18 [ 259.888389][ T8767] usb usb2-port1: attempt power cycle 09:37:57 executing program 3: r0 = syz_io_uring_complete(0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffffd}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x40}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000050}, 0x4) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', r0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x4, 0x3, 0x40, 0x6, 0x4, @local, @rand_addr=' \x01\x00', 0x0, 0x1, 0xd31f, 0x3}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000004c0)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x58, r3, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40080d0}, 0x1) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000600)=0x1) r6 = openat$vsock(0xffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x121080, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000680)=@assoc_value, &(0x7f00000006c0)=0x8) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000740)={0x1, 0x28, [], 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r7 = syz_open_dev$hidraw(&(0x7f0000000780)='/dev/hidraw#\x00', 0x2, 0x400100) fsetxattr$trusted_overlay_upper(r7, &(0x7f00000007c0)='trusted.overlay.upper\x00', &(0x7f0000000800)={0x0, 0xfb, 0x88, 0x2, 0x81, "877b4194470a9272fd9a32577437257d", "5f88dcae8e16bd10a63031af7beb1fa16581034d8c729b54007a681423751761b6068149df1f6a044e59520fe6fd5e05f58bceb6484454699844b0eabf54fb9d8c5c67baf34afd4a9299824a0a790c6079259d2ee0ce3fd25b428ce92281eaab68b1cfbee001cb243bc036b6aa9b2c96a0b1d9"}, 0x88, 0x1) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x404c004}, 0x8080) syz_open_dev$hidraw(&(0x7f00000009c0)='/dev/hidraw#\x00', 0x3, 0x86800) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000a40)='batadv\x00', r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x2c, r8, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfffffffb}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x2c}}, 0x4000) ioctl$DRM_IOCTL_MARK_BUFS(r6, 0x40186417, &(0x7f0000000b40)={0x9, 0x40, 0x7, 0x6, 0xf, 0x3f}) 09:37:57 executing program 2: ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:57 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000190000006001050000000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef0100d6f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x5d, 0x400}], 0x0, &(0x7f00000012c0)=ANY=[]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = getgid() lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000080)={{}, {}, [{0x2, 0x4, 0xee00}, {0x2, 0x5, 0xee01}], {0x4, 0x2}, [{0x8, 0x4, r3}, {0x8, 0x6}, {0x8, 0x2, 0xee01}, {0x8, 0x1, 0xee01}], {}, {0x20, 0x4}}, 0x54, 0x1) r4 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) r5 = syz_mount_image$bfs(&(0x7f0000000340)='bfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f00000003c0)="39487e144343fba492ccba919306e76ee60c7101d960a063025b962fdc5c838de19df5c7b55878ba88b29d6a8b1313854e66708acb3d02f0ccb22abf8f5ab195968b3abd0c3158ec0b488a631d1d4b7ebd710a5d8b8d5c33410cdba07f5c9dcf6f65f3875e6d69fc45f3fb630e149134976b2c9bc3f341fbaa085ba778b3ebaf67761d95aa2d3020608a2d9e2aba88300a69453584272c", 0x97, 0xfffff43f}], 0x40200, &(0x7f00000004c0)={[{')&&%:^{\xf6C^'}, {}], [{@fowner_gt={'fowner>'}}, {@dont_appraise='dont_appraise'}]}) r6 = gettid() tkill(r6, 0x16) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) read$FUSE(0xffffffffffffffff, &(0x7f0000000500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$unix(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)}, {&(0x7f0000000240)="75176ea27cba7a2262f23762297b038ea41b3ce53148e0702e33daa4147df9955d98b6102bca6049ce64f8fcb42c9a0f978eb74bcd747aa41f70f87c4f584d717b9705a2aa9d", 0x46}, {&(0x7f00000001c0)="54f8eb9877fe726d302e40e56b376983a1f96db5556d87f4611d2bd5bf8c36a78576ce19ef48c1f8d80eb64554e1", 0x2e}], 0x3, &(0x7f0000002540)=[@cred={{0x18, 0x1, 0x2, {r0, r2, r3}}}, @rights={{0x14, 0x1, 0x1, [r4, r5]}}, @cred={{0x18, 0x1, 0x2, {r6, r8, r9}}}], 0x44, 0x20048000}, 0x40000) r10 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20042, 0x0) setuid(0x0) syz_mount_image$fuse(&(0x7f0000002600)='fuse\x00', &(0x7f0000002640)='./file0\x00', 0x0, 0x0, 0x0, 0x61, &(0x7f00000026c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x458756a}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x600}}], [{@permit_directio='permit_directio'}, {@obj_type={'obj_type', 0x3d, 'bfs\x00'}}, {@subj_role={'subj_role', 0x3d, '$'}}, {@context={'context', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'ext4\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x38, 0x66, 0x32, 0x64, 0x37, 0x33, 0x35], 0x2d, [0x39, 0x62, 0x39, 0x32], 0x2d, [0x33, 0x66, 0x63, 0x31], 0x2d, [0x5a, 0x33, 0x30, 0x62], 0x2d, [0x31, 0x32, 0x31, 0x61, 0x36, 0x33, 0x31, 0x39]}}}, {@subj_role={'subj_role'}}]}}) openat(r10, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0) [ 260.737537][ T8767] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 260.914060][ T9637] loop0: detected capacity change from 4 to 0 [ 260.940419][ T8767] usb 2-1: device descriptor read/8, error -61 [ 261.047807][ T9637] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 261.057302][ T9637] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 09:37:58 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 261.229678][ T8767] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 261.408252][ T8767] usb 2-1: device descriptor read/8, error -61 [ 261.527780][ T8767] usb usb2-port1: unable to enumerate USB device 09:37:58 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@ldst={0x4, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0xca, &(0x7f0000000200)=""/202, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x400, 0x80000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x9, &(0x7f00000000c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x112d}, @generic={0xe0, 0x8, 0x5, 0x405a, 0x6}, @ldst={0x0, 0x3, 0x0, 0x6, 0x9, 0x18, 0x10}, @ldst={0x2, 0x2, 0x1, 0x0, 0x9, 0x8, 0x1}, @map={0x18, 0x7, 0x1, 0x0, r0}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000140)='syzkaller\x00', 0x41e1e44e, 0x67, &(0x7f0000000180)=""/103, 0x40f00, 0x1a, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xf, 0x3, 0x7fffffff}, 0x10}, 0x74) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000480)={[0x800000000000, 0x9, 0xfffffffffffffffe, 0x1, 0xffffffffffffffdb, 0x200000000, 0x2, 0x4, 0x200, 0x1, 0x400, 0x1ff, 0x60c, 0x9, 0x7, 0x200], 0x0, 0x200010}) 09:37:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="295a31174fdfb5a63ced5e958dffe2bd42c44ba97bde455a090931f9a6135720a82b560ca23ba29e96691289128374bf87fced4a0e5c87747d103bb9dc0d46845c307bab94aaf90c0e4d8e815cab8829830690ca8bca68f2edb3b7dc9cd88cf4db1306e6c0ecdddd09848f3d7ae7cffd1f93f49059bf4cfa9a4af616b17e4232c06b190710a7eda66439f79b18f6c64f696ae1bbdf6e13cbcf94756b6567efb6226347255a8018f3dc0e4070104c6e754bada3a5caba67b8ad5d1b059133c42bb75b4cec211aad259610b64de1", 0xcd, 0x3f}], 0x20000, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, 0xee00}}, {@mode={'mode'}}], [{@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r1}}, {@subj_type={'subj_type', 0x3d, 'overlay\x00'}}]}) umount2(&(0x7f0000000000)='./bus\x00', 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r2, &(0x7f00000001c0), 0x0, 0x0, 0x0) 09:37:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:37:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:38:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x171101, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x4000, 0x0) r3 = openat$autofs(0xffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x8280, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) dup3(r4, r1, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) fcntl$dupfd(r4, 0x406, r4) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000000)=0x2000) [ 263.073805][ T9648] IPVS: ftp: loaded support on port[0] = 21 [ 263.878130][ T9648] chnl_net:caif_netlink_parms(): no params data found [ 263.951544][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 263.958235][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 [ 264.067475][ T9648] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.074778][ T9648] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.084498][ T9648] device bridge_slave_0 entered promiscuous mode [ 264.098153][ T9648] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.105425][ T9648] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.115428][ T9648] device bridge_slave_1 entered promiscuous mode [ 264.189399][ T9648] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.227803][ T9648] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.335254][ T9648] team0: Port device team_slave_0 added [ 264.365655][ T9648] team0: Port device team_slave_1 added [ 264.454608][ T9648] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 264.462410][ T9648] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.488765][ T9648] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 264.561566][ T9648] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 264.568985][ T9648] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.595269][ T9648] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 264.751710][ T9648] device hsr_slave_0 entered promiscuous mode [ 264.782746][ T9648] device hsr_slave_1 entered promiscuous mode [ 264.820027][ T9648] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 264.828346][ T9648] Cannot create hsr debugfs directory [ 264.908763][ T8767] Bluetooth: hci3: command 0x0409 tx timeout [ 265.532873][ T9648] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 265.612116][ T9648] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 265.662304][ T9648] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 265.739454][ T9648] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 266.349491][ T9648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.389591][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.398741][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.421358][ T9648] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.450757][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.461201][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.470811][ T8438] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.478270][ T8438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.527654][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.536884][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.547511][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.556867][ T8438] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.564321][ T8438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.573629][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.584806][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.650929][ T9648] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 266.661898][ T9648] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 266.686764][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.697701][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.708915][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.719278][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.729875][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.739558][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.749893][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.759648][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.772112][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.782272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.843037][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.851205][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.891484][ T9648] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.959932][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 266.970115][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.998225][ T4694] Bluetooth: hci3: command 0x041b tx timeout [ 267.040384][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 267.050085][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.072495][ T9648] device veth0_vlan entered promiscuous mode [ 267.081390][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.091058][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.128244][ T9648] device veth1_vlan entered promiscuous mode [ 267.201808][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 267.211184][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 267.222113][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 267.232019][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.253394][ T9648] device veth0_macvtap entered promiscuous mode [ 267.274501][ T9648] device veth1_macvtap entered promiscuous mode [ 267.331133][ T9648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 267.341775][ T9648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.351844][ T9648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 267.362501][ T9648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.372544][ T9648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 267.383318][ T9648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.397760][ T9648] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 267.405620][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 267.415095][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.424511][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.434504][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.456536][ T9648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 267.467716][ T9648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.477821][ T9648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 267.488486][ T9648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.498534][ T9648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 267.509189][ T9648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.523082][ T9648] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 267.537191][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.547541][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.574554][ T9648] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.584147][ T9648] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.594928][ T9648] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.603903][ T9648] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.979426][ T1431] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 267.987709][ T1431] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 267.995366][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 268.132934][ T1022] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 268.142083][ T1022] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 268.160682][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:38:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x50, r0, 0x57) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x202200, 0xa0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x5, 0x2, 0xa, 0x4, 0x0, 0x80000001, 0x200, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0x101, 0x7f}, 0x2, 0xffff, 0x4, 0x1, 0x7, 0x1f, 0x8001}, 0x0, 0x4, r2, 0x9) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="600000d8bbe749e7b6822600300001000000000000000000000000004c000100480001000800010069666500200002801c000100000000000000000009000000000000000000000000000000040006000c00070000000000000000000c0008000000000000000000d118b2967895ed4e52515d5b2a26697f4a370c5d743595f6bcf15e031d2d"], 0x60}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=@ipv6_newaddr={0x78, 0x14, 0x10, 0x70bd27, 0x25dfdbfd, {0xa, 0x3f, 0x0, 0xff}, [@IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_FLAGS={0x8, 0x8, 0x1c8}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, [], 0x2c}}, @IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x208}, @IFA_LOCAL={0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x20000005) tkill(0x0, 0x16) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x8, 0x1, 0x9, 0x9, 0x0, 0x10000, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0xe1, 0xa193, 0xb645, 0x8, 0xd8, 0x80000000, 0x600}, 0x0, 0x7, r0, 0x1) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x501}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r5}]}}}, @IFLA_TXQLEN={0x8}]}, 0x48}}, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) r7 = gettid() r8 = fork() clone3(&(0x7f0000000680)={0x100200000, 0x0, &(0x7f0000000180), 0x0, {0x15}, &(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f0000000640)=[r8], 0x1}, 0x58) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x7a, 0x20, 0x0, 0x20, 0x0, 0xffffffffffffffe5, 0x40000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x7, 0x5}, 0x1, 0xffffffff, 0x800, 0x8, 0x7, 0x5, 0x400}, r7, 0x9, r6, 0x0) 09:38:05 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:38:05 executing program 1: ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000440)={0x1, 0x7}) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x1000, 0xfff8, 0x0, 0x0, 0x11}}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$btrfs_control(0xffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x141000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0xc62f98480d383858}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000003c0)={0x6, 0xfff, 0x7, 0xffffff00, 0x40, "23d1f92b51b2d91012418e0c4c29c0d68bbd5a", 0x4, 0x16}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f00000000c0)={0x0, 0x99}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000200)={0x7b}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc01cf509, &(0x7f0000000400)={r1, 0xff, 0xff, 0x3f7a}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0xe, 0xff, 0x5, 0x3, 0x3, 0xffffffff00000001, 0xffffffff, 0x6, 0x0, 0x5, 0x2, 0x3, 0x1, 0x6, 0xcd, 0x1394], 0x0, 0x100010}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cf]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xc}, 0x20, 0x0, 0x0, 0x0, 0x1, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:38:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00', r0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000002880)={0x34, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x7, 0x4}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0x0, 0x3, 0x2391}]}, 0x34}}, 0x0) [ 268.566388][ T9917] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 268.576316][ T9917] nbd: must specify a size in bytes for the device [ 268.634461][ T9918] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 268.883669][ T9925] ip6gretap1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 268.892062][ T9925] device ip6gretap1 entered promiscuous mode 09:38:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000140)=""/4096, &(0x7f0000000080)=0x1000) socket$inet_mptcp(0x2, 0x1, 0x106) listen(r0, 0x10003) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x4e20, 0x80, @empty, 0x4}}, 0xfffffa51, 0x7fffffff, 0x7ff, 0x0, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0xa}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x0) r4 = semget$private(0x0, 0x4, 0x0) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000001c0)={{0x2, 0x0, 0xffffffffffffffff}}) semctl$IPC_RMID(r4, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000012c0)={0x3, 0x70, 0x7f, 0xa6, 0xff, 0x57, 0x0, 0x1, 0x80090, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x7ff}, 0x0, 0x3, 0x7, 0x6, 0xfff, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xb) 09:38:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 269.070640][ T4694] Bluetooth: hci3: command 0x040f tx timeout 09:38:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 09:38:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:38:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)={[{@logbufs={'logbufs', 0x3d, 0x2}}]}) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/64, 0x40}, 0x0) r0 = openat$vcs(0xffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0xc800, 0x0) sendmsg(r0, &(0x7f0000001680)={&(0x7f00000001c0)=@l2={0x1f, 0x100, @fixed={[], 0x3}, 0x295, 0x1}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000240)="1b03e2d425a5ef8f3dbae0a052ec94abb2bae19547db29b8d7725531c22ced668b57c11d7cb778d5e966dcaf88e17e4587788391dcababf40fc6246ddc1045e8f8b3d93eb33d34026325850ef33cccc87d572d0bbf7bc71ede4ed1e9fff9b5f6c998cc413c55b85cc3", 0x69}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000100)="67d1404a7c48d0b7c90d33e6000000", 0xf}, {&(0x7f0000001340)="9fb7fe6a021183e85ab3321aaeeb724ba0820a83dae2fca10f295bb8130094b552ffd1fc20a27cab4a3fe9e0cea11831a991de8400fa3154a36e3c9d0a92435f971d4ca7eef2ba40e7747fc5e76b0fc603c926d3645248bb4cca4f9db4f7f9bfe7101826e8cd74a186fc04ef7efaa8eef831fe2ab87bb75e273338a522a4844a32a92825c5511e497971015378f327cea33e83d314ff40911df2c74fb8afb0ebbce6dc26fd810fbf1ebab2e7ef20969ebcd667a27a70c2722ebf9a972a97a06470827e252930f9ea0a83d4f5c2e7941d3f3a393f346160d9f592fb65792a7c4aa43a37621c668116", 0xe8}, {&(0x7f00000002c0)="396b09d2e6ebe12dfb4f850400a58db492", 0x11}, {&(0x7f0000001440)="82df1cf009dad255c9a9fdf0f447e78f135742fa87b1a1487c7fb292dec518a7fa3bbc75467f1e0c762f9045dea140388673548b91d0a5363d641b8098e2b2901c8548d7d4d8ce6cd3628415ac1f8bba2c63f87c5a91eef2bea13da82ebd32c0ac58a703cf04f7d4e7a6342357181df3e49e225082bbea1e800a09e90471411187d2dd8dc2cfc465311284ad261b804cceab292260e78e7b93484dc5a334ba042940d504ffbea3151c6d43b75917642562009cde6c3712e7ec72d4089eb5685fba03", 0xc2}, {&(0x7f0000001540)="07c591c5db6fce450ec8433a77d0d86f9ae90674cf17c579128f6038aa77aaf859828018c3db9370386b1781bf607e4d249ca0e344d7576b0aa859e28ccc9d5fa4a4de328bd2e5a8e4d7317a9099eb31ac4f423bbd2014ab92023e884f3a3062d9c75ec1638ec3bab0df1de33381d23c55b5851afa81c05be0981516581491b22c15b2d88822d0dda749843bdd5ef6171e55173d892c91481e39735ae461627e6c14d74c71d35856192f7e602e622addb10199e41101ec3657add245e3701f7025379669bff4eab8a58973bb18b0618ebc011908a04f22b7b95fdfe4ebf7d01052a1", 0xe2}], 0x7}, 0x40000) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) fcntl$setstatus(r2, 0x4, 0x400) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r4}, 0x8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000001700)) 09:38:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x50, r0, 0x57) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x202200, 0xa0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x5, 0x2, 0xa, 0x4, 0x0, 0x80000001, 0x200, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0x101, 0x7f}, 0x2, 0xffff, 0x4, 0x1, 0x7, 0x1f, 0x8001}, 0x0, 0x4, r2, 0x9) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="600000d8bbe749e7b6822600300001000000000000000000000000004c000100480001000800010069666500200002801c000100000000000000000009000000000000000000000000000000040006000c00070000000000000000000c0008000000000000000000d118b2967895ed4e52515d5b2a26697f4a370c5d743595f6bcf15e031d2d"], 0x60}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=@ipv6_newaddr={0x78, 0x14, 0x10, 0x70bd27, 0x25dfdbfd, {0xa, 0x3f, 0x0, 0xff}, [@IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_FLAGS={0x8, 0x8, 0x1c8}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, [], 0x2c}}, @IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x208}, @IFA_LOCAL={0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x20000005) tkill(0x0, 0x16) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x8, 0x1, 0x9, 0x9, 0x0, 0x10000, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0xe1, 0xa193, 0xb645, 0x8, 0xd8, 0x80000000, 0x600}, 0x0, 0x7, r0, 0x1) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x501}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r5}]}}}, @IFLA_TXQLEN={0x8}]}, 0x48}}, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) r7 = gettid() r8 = fork() clone3(&(0x7f0000000680)={0x100200000, 0x0, &(0x7f0000000180), 0x0, {0x15}, &(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f0000000640)=[r8], 0x1}, 0x58) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x7a, 0x20, 0x0, 0x20, 0x0, 0xffffffffffffffe5, 0x40000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x7, 0x5}, 0x1, 0xffffffff, 0x800, 0x8, 0x7, 0x5, 0x400}, r7, 0x9, r6, 0x0) 09:38:07 executing program 2: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 270.286729][ T9952] XFS (loop1): Invalid superblock magic number 09:38:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000140)=""/4096, &(0x7f0000000080)=0x1000) socket$inet_mptcp(0x2, 0x1, 0x106) listen(r0, 0x10003) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x4e20, 0x80, @empty, 0x4}}, 0xfffffa51, 0x7fffffff, 0x7ff, 0x0, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0xa}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x0) r4 = semget$private(0x0, 0x4, 0x0) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000001c0)={{0x2, 0x0, 0xffffffffffffffff}}) semctl$IPC_RMID(r4, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000012c0)={0x3, 0x70, 0x7f, 0xa6, 0xff, 0x57, 0x0, 0x1, 0x80090, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x7ff}, 0x0, 0x3, 0x7, 0x6, 0xfff, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xb) [ 270.451903][ T9952] XFS (loop1): Invalid superblock magic number [ 270.619121][ T9973] ip6gretap2: default qdisc (pfifo_fast) fail, fallback to noqueue [ 270.627752][ T9973] device ip6gretap2 entered promiscuous mode 09:38:07 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0xe55, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f8}, 0x14) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000040), 0x4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4dca) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000640)) shutdown(0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x1, 0x0, 0x0) r7 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)={0x20000001}) dup3(r7, r4, 0x0) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 09:38:08 executing program 2: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) [ 271.147553][ T4694] Bluetooth: hci3: command 0x0419 tx timeout 09:38:08 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', 0xffffffffffffffff) r6 = socket(0x10, 0x2, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r6, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0, 0x28}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)={0x1c, r5, 0x1643a3a6fd511339, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, r5, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80000001}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0x16}}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008804}, 0x1) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000014015c43bcbf08fd800", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x88, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff3}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x58, 0x2, [@TCA_FLOW_EMATCHES={0x54, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x48, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1}, @TCF_EM_IPT={0x2c, 0x2, 0x0, 0x0, {{}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2fc0}}]}]}}]}, 0x88}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delnexthop={0x28, 0x69, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [{0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x20008005}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 09:38:09 executing program 2: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x80000000}) 09:38:09 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="12110000789790208a0701000900366fc11ce9526f2d010000001c0904000005cf459c00"], 0x0) 09:38:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000061001800000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r1, r2, 0x14}, 0x10) [ 272.095473][T10005] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 272.203024][T10005] x_tables: ip6_tables: policy.0 match: invalid size 312 (kernel) != (user) 0 [ 272.293782][T10013] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 272.335872][T10010] x_tables: ip6_tables: policy.0 match: invalid size 312 (kernel) != (user) 0 09:38:09 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, 0x0) 09:38:09 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', 0xffffffffffffffff) r6 = socket(0x10, 0x2, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r6, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0, 0x28}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)={0x1c, r5, 0x1643a3a6fd511339, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, r5, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80000001}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0x16}}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008804}, 0x1) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000014015c43bcbf08fd800", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x88, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff3}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x58, 0x2, [@TCA_FLOW_EMATCHES={0x54, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x48, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1}, @TCF_EM_IPT={0x2c, 0x2, 0x0, 0x0, {{}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2fc0}}]}]}}]}, 0x88}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delnexthop={0x28, 0x69, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [{0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x20008005}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 272.759049][ T8438] usb 4-1: new high-speed USB device number 2 using dummy_hcd 09:38:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0xe, 0x0, &(0x7f00000002c0)="fbef640800000049995ca29e0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) sendmsg$nl_route(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a00)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002e00)={0x5, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000000000000000000a6000000183a000002000000000000000000000015b1000000000000950000000000000085100000ffffffff18120000", @ANYRES32=0x1, @ANYBLOB="0000000000800000180000000100008000000000e0a7000085000000930000009500000000000000"], &(0x7f0000000840)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x14, [], 0x0, 0x9, r3, 0x8, &(0x7f0000000980)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x1, 0x7, 0x7, 0x10000}, 0x10, r4}, 0x74) r5 = dup(r1) sendmsg$nl_route(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x40040) r6 = syz_btf_id_by_name$bpf_lsm(&(0x7f0000000140)='bpf_lsm_tun_dev_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@raw=[@ldst={0x1, 0x1, 0x2, 0x0, 0xb, 0xffffffffffffffff, 0xfffffffffffffff1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000080)='GPL\x00', 0x28, 0x1000, &(0x7f0000000e00)=""/4096, 0x41100, 0x2, [], 0x0, 0x1b, r5, 0x8, &(0x7f00000000c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x4, 0x9d8, 0x1}, 0x10, r6}, 0x74) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000002f40)={0x0, @ipx={0x4, 0x2d, 0x3, "8e24c87e228e", 0x8}, @nfc={0x27, 0x0, 0x2, 0x7}, @can={0x1d, 0x0}, 0xfe6, 0x0, 0x0, 0x0, 0x6, &(0x7f0000002f00)='geneve1\x00', 0x3ff, 0x7, 0x26}) r9 = openat$bsg(0xffffff9c, &(0x7f0000002fc0)='/dev/bsg\x00', 0x101001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003080)={0x14, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x93}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @exit]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x19, &(0x7f0000000440)=""/25, 0x41000, 0x0, [], r8, 0x1e, r9, 0x8, &(0x7f0000003000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000003040)={0x2, 0x7, 0xff, 0x3}, 0x10, 0xffffffffffffffff, r0}, 0x74) r10 = syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0)='wireguard\x00', 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r7, &(0x7f0000003340)={0x0, 0x0, &(0x7f0000003300)={&(0x7f0000000240)={0x5c, r10, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e22}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x5c}}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r9, 0xc01864c6, &(0x7f00000004c0)={&(0x7f0000000480)=[0x0, 0x2, 0x1f, 0x2497], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r11, 0x0, 0x1000, 0xd7, &(0x7f0000001e00)="1d407796f3b13ab9060617da5b31ce88039e7cb88e296a19404323ff3f89529ccc83634ccc58e429a3a4eb4a64a7c5e8f659380efc0f91d054e4c96d430acbed27e444ca3bb3c05119a9cb9a3e202ed9d131215bfe636869d27bba8a8c0db4bf65e26a9f899c96d78ff89ef3959a77fae04d662dfac441014ceef171185fbf7ef5b1b79b827ea7f61ea42e7b7fe2dbb5c496f6cb3894153c0a2ca86a8a241134ec588e41d3d51c8f16f1cb9e7e2d26fad36971162afbd81923a6df9aba0f3715305a0c1f3b0fd80d131d955d5dcb64c1a5191a8cd71414cbb93bf4ef2b8e1f8b68ade071c365eedcd65b000c720d940097b6ee1eef68cf7d94341314c27ca5032ba6d31657afaf290bcc9ce9c06687283cb43ab5adf28285217cde2ef3bb9b33be8fbcfa31be1d630a4e461ebbf18f00d8763bb45fca1eb168ecac664c2d7f4146872c7c52f8743334f8b5068e08f99209bee75a9640d27834f5c1526649a4fc4ed513061b91b28e243fc1f500b9fbeee5cc6a2e7252035ff24183f485763e33a6a7648de08a80007c517c163a96824efa711ecf7dece7a480effac4f3c639866b2c70ac82ea644f8dc0bea140c37c02d49725163d79129f23eb1c7d83d6d1c63323fb883a09688bcb90691fdb9d5f2122fa523ce294cd309284aac9d5d7e2b95ac91025e1a96724851aecd37afc25c2e949d513fc3258ddfcb3e74fa67e07a60adf50412f95f672b64ecd35288fcb710ca5b7678b8d8863255137dfe582090d12c5841ef2a9c48eaccdc75428e920987a01c0750312712b710c80f9f0ce87514ac53f2232d527b98d4353392098846056d5fef3e97528a2c96145932df40f17d28055da0bd0f9d97e4bcf1c8434d2a79bca8da23086aaf3d2483f007e5355c77248193787577ba704de8ce79c4b5e358cdfb5609c715bd4e445bebf210684a9323e3b59823e3e004d4c8939e422a00ab78d876f10eb5336ca484a4baff482e2e43e37afb2d450a298c1deb217fad1b2139951f64c7c0bb479bc02827e9b1b54d3d995d5bb8a8bebd4c1ff29acb18ca650519449baf7e671512d8476f88b30111b788ba8e919c16fcfc751667ccd79da107bf67a3d07af191996e988455fa4fbcc19c5f376639a9b80baaf94ab4a43ae272d515c3307747dcaa1bcf3e3477588465b7283daf1ef48877219f20784cf1f0839e42f8b0252bbeda15816b5c59bb00629eb55a2999e346e654b06fab51c4ccc0c3502cd8e561b555d79c2d82067913757c4bf604deab5411866faf10e532e3eaefc7902a608e493b045d8151b8ca4bcb95c085910a58fcd9a4b4dc81b988d681999d29a55b672f50f9fef83891feee0cb94a301c37978768b3e4a04aae367af4f6da901b63343e31bb66428562d785a78263181cd7c8706f5d33d1900e915c5f1a913c1a22e0cdacf85f3efe537f8d2c0fe16331e4673320fcec53a758d04a9408ec822fcb9e55aeb44d43d4e93adfe0b033084a5927aaa83b5c525a581c7f61e55a88743942d202b84856c8d049e78385333059a2bf997b77536f009095ed11c6e6fb633ceecfb6ec1bf710e2bd9ff587b13c58174080abbd781a68137a756be9177e22afcc485a645308803c32f11512b28ac911c03e91db2a1acf9b9e192f8ccc8d2d1795cc2c11157c979609ef37ed12f4e295f9628e7e96570997be27abbac467e81b26ff1122e7941d8336a0ebdf4a4a2942e35bdc52c23235531bab86d6dc429abb64bc0b58bbd9e5a7256b0c886f4007d5d3822700353b0868bba5710d8c3a3dca261ccc4b5f4439daa1c54014b2c52ffa37c586309691590f0ef855a300e01875511bb7c5b7eb9bd577242e0f0409d729e51a7399d5cce0e00a747500250ac8f590c37ac05336141f954a18cf31132132f68ee1f543036f83454f00c820d2aec0b7d261c2d6dc2201b25d65cc5588978a39eb34cd53d8deae93b54f5d3b81b749a8e9ff4431ce04b7c03c11bb108db7dc67d7e343bf07accb1eb5d63ad5e2f210fe7a4a51196e92281ff3d047ba7b9c21a00cedbb418dc989868d7d7ad5c31a1e44d3780fe9f2b0c4a820c66114fdf1cb621d43c18282f5e24ff7743c0c232f9b08493378805448ae668117d2dce121461f86327b07dcbf189b004ad41889a0962f1e86748186e3c2b4873b41932d4486c6ffb17127e0fdb2b1336edd3e5810872988cf7538cf3347ed0ba1afe31d27b00cb9cfac75f289d2506c2b08af1f7d1b5816d5e9ec6b2fc875a1f6e81831d281660010ae91e344b56bf464aa0b5b4611f0a38741244166ef10715ee23b52c705f3d8df5e168e25025c4666525e754425efe89f821128b2098e8465825585daeef441154b968c16212732217c4384b6fabe6a803baa77e7e6b2923b096b3f85b1aa79e19dc019ff280531bac7332db88ae156e909b2527077197c052eb73dda6aaee090e01a42062b4a0409dddf479dce03bc81a6da12bf38d3650a26c6d534ffc99a146d835fefd6c7860de4500a08b7023ba757e79f72b8f7c2fd6dc90b2fa9f8ad8d2cdb9b1ea1fa5031ffa97b487b75d822a915456424539d12a92767aaf3e305eb81b76e224ef373e28de27dd88c6c08128b765ba9bf4d6cf49a48b6f5409d7f270b14e4c3eb7de6bf731255fbf8ae324b7ff2cbcde67abc09176f2b557de786e41de28d4065e766145fd243d81811bbae8739b263ac267a556a6c259f29405372755f0218cc7df3848a8d2e8b7ba26f116881ba9bbb7b4001628f64c7bd89a06fd33f0a0b2d35b36a5bec19f04d841c3cc879f22ba1757b0e004fcab7e26626243ce28101142c68d930b06e8783449e24c2ae2ef9d6675bcf1a5b871405a5f70030be86ddddeea99fe019c8e6336a13fb3dcc15780fca97ddc86ffc2ba8b3eff6e8e5a118f936754dd320d319648d60bd672f8c6fc6d2c0c156fd9b36aa98c999a52c1b27a42bc7d91edc46f2a33d268e6be5f01c88c01b46cf7f03c3e812ae832a68256434cf98310d23f94d145f23f3a88208a78862a928429066dcb2f85fb37350f07e8f19d989477f8fb28f06a70c1cdd15d52d719906077cfa03d4d1e1581489c384b4185182f479d940f740264d5ed07eca8e7e64dbaccc6fbff17bb30da34bc66007afdffa0ccdc586c85100e19414a5f91bae849595bea32fe426537a4346aef477f7dbdd5c7583f097cb05a83565949a8f9891eb3ec68b4d7bd469d9cb5ec440211898c802af1281d2703622aab8967d807029b30b1f9f7a90ad5bb1cb47bb4d8d31856f00f628871cffacf9a93b562832754ba405010b4db8551e40d7a925b7a9caec9e909e8b694a571a7073c7eb440b0935fe9fe40146cc4d518401bbc5c6e41ede0fa6c977cac613b9f67ab9dade6c07bcf5fa08439345b1ec40df43a0baa1e8a4a8c1bde8d2529b1af8c8b8c524d21c2c82a0af1a73a584e238b37aff54c8916416f87545866fece47cce702382c2110cebcbab7f29de7667215243a46a38752de7fdf2b8685e23c733007f09bceac3b8e7592813436e4f352ec411551bd081c2d467e986bb41afc4eab3f5aa4b2af24d46398214bd40fb4d8b07377e6108732d2c785d4206ffdaf5d26b85fa7fcb6119fb577766d01b72d00961a4b3c3a333da859f250fed0eacda142bbd736cc3083f85aedbae1afd3323d9dc3a4c6a449b4e8c5463989e924689e0ff06a30c1f0599f6fa27b2910f31575b2efa95b932b4a9160868da44b0d0388f402733c5818bfc966fa2f5107eb60aa2dc2bd2d414d1458016dd21b820a67f43705ba3678d62a9fb966cf4836b2c34c024e3e0794099f54b5ef7a1bdb0cc035e1ea3878824e3e823960c392d990e601ed4f3e458425a421a0fc4f88378f27a1fb36afb2ccce19d608854df7b50bdd73a93f0fd98d6c44d0056e8ea924a155b420be9e6828d6987ca5151ed6b9d2307e964778a6e637c7541c002c30bfd6738ac5b76020cdf7d5ec9e8d81d3372a2e8a91e21e6022f9b5b16c92cfe3f211c54642e07addf7227d970344244f41362271d5adaa1eb64aed59c0b32cc45e602eb694f70c4cc02e6867d42dfb10472fc20454fc356d414a7dd9ca61cb9851145640203c56826395c67b435a7d36ae20c81f3d70b74b10706eb0d8c982a12101bafb3ee3244154950755a91121ada0d3ef746fc96035d327a014a9a21c63eda859ca8880027eb728698953f604e6dfb02401519e47a6ba6f2e39efd0dc70f415304ead8bfc240600f504c2253583e456543495364159d05719a6f2e613732166bb69ff35915cfa50356fdaf616c80272c4e0ecd0b3ebf13f180804f96d85d4881afd659880a5c8f706840ed3f2ca18264989ae00fe04a720d654cbca1307b5749e5e91827eed0c5e872b44eec605c7e664b288573237e51350c3169cb0d86a3d84cdb130525ccedb1f50f2e1fe01d31238de290cdd1dd3f20030eda84e6a0df68ce8bdb3a3312352ea325041cecc4f7f15ec5b6c7991b6a03e206d94584e207bc10bda14a7847c9369c89d93aa3275533f57bee2aac88b097dcd9ce29b0ad20872ff64dafa22252cc610b624cc2d57031d0cb931dc95aa02bac90fe09a4ff3e3391904c4daa0be793895331f22e35b55bf5d106bb83d721a59f6719440b88e4b4a8b394f6dba30fbf7d30dc12e4a25e4b2bdb83e3c26669aa5eb5f5512f1d5c3a8a6cb2549363a30c15168c78c4716bb89084ca3de04cb6d18a6805d5b2a593fc745bf5db2cad2c1f7deda19c2c81392e8479ea15b0c59512e8d9ad397eaa61d9b847027bf5b0d7e8ff5d9347269ab9abc1b152ad73893952f3b511f12bed7469cfd968a2cab14a9de9fbd6f7b85953c801ecbdc14c62ad90456c51f24c1de15c557cdd54970b33338426492e3998543ed97b884335dcf69ed297cca570892a40ad34ecb2e6af7f47051fb97f2e23a950dc6fb99473b6da205917182bc1d41ad433e4810b43f2b707efd238d164970bc02768abc10eb112d29115eb6c143e51551fd4134ac0cd27a7002089342e08c7ec0ba559a8440e1d00fa07529251cf27fae3a3ebabdf44ecf24f8e1633bf2a2fac4f94413cc03a56869b1214538815c4609369348c8e405c071daccb6e14080ad735c7b01b68322ec67e9c5ed8ce32fcefce77c2ffe565c8ec10983b09b9a5d6bfd87542412b19a268693ef47ba47f1c59722b395cf9f2f99193e0e44e92ae420cf4bfe948ed3cbebfeaa6ad17631fa349b12a14ac92024b10549448b25eca842c74eaf000c2e8304f74ede146a4dd70a109fc80ae10139eebadf0b7bcb2a1bca8333df2be8025df8245efa490200d9c67eca799fca6b8e57d556d2404e0c9c569a9eaac2a16ae06990eb917cdc37c432c7dd8a31418c7e7af5c7a408e83697246c10dfebfd371550470ce4a39d15e9fe7d25954fbdaa6da8e0c6c442567c20108b686c1a5067f7099833d97cb32fd5db13c9be1fb38b7ddefd9cd0442893d61ba419a24b863aff5eb7e36f0c6e6f8ccb39adace8bbe67f19bf74abf437b1c7e28cb426b95564f10179205e96a1705d0511c9ac9d5a4ce15b77ef5b7b8ed0027bcde3c6929a9b0d47409a9b6a6f436aab668fa8b05f6194c2c9d8c32d9989c3e27b39b4fd562372523e9f1cdc76cc0943c737756e5b1aac13fad083517e16e8942526c99f43759768290bff1e39a371b8c819be0bd6fdab3c98e1cd76cf983d59e549a68e65f54492ae9a76f7022d2162ad6873f432559e18abf47d7515617ab2c98061be8f10f66ca47292fb107bdaa2f8badb0d56f42b86a2", &(0x7f0000000500)=""/215, 0x8, 0x0, 0xbf, 0x1000, &(0x7f0000000600)="dc8b2a4c733a5248815f9829634ed37921597bd77506bcc1efc624ebd7519d86cf0ac4b8a6f05c5391880ea82819e54d4e5859b46f60bf76b1edfaed4c868f4831299db78eba349ed0102a30761dcb6fe3ada43415fa5b849988436b22ff56dc78a100b54b0d993493fcea170bb2602c8e769f5b7f220d507daaeff1dd08e1905f34824dfcac8fc64f10c958c0caf868b254b3b1335bc24fb877d33707cb1c5c8820f54033a6e9173d986fdc7fb6d9bc993f730fb1a6384fe8481dc44103c6", &(0x7f0000003380)="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", 0x0, 0x7}, 0x48) 09:38:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, 0x0) [ 272.949497][ T8438] usb 4-1: device descriptor read/64, error 18 [ 273.042958][T10024] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 273.124878][T10031] x_tables: ip6_tables: policy.0 match: invalid size 312 (kernel) != (user) 0 [ 273.217097][ T8438] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 273.409969][ T8438] usb 4-1: device descriptor read/64, error 18 09:38:10 executing program 1: r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23, @remote}, 0x10) bind$inet(r1, &(0x7f0000001180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) recvmmsg(r1, &(0x7f0000009ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000000040)=""/105, 0x69}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f0000001740)=""/4096, 0x1000}], 0x1}}], 0x3, 0x20000001, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x3f, @local, 0x743}, 0x1c) [ 273.530227][ T8438] usb usb4-port1: attempt power cycle 09:38:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, 0x0) 09:38:11 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect) [ 274.237355][ T8438] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 274.408714][ T8438] usb 4-1: device descriptor read/8, error -61 [ 274.516044][T10049] vhci_hcd: invalid port number 23 [ 274.521530][T10049] vhci_hcd: default hub control req: 0000 v0000 i0017 l0 [ 274.677144][ T8438] usb 4-1: new high-speed USB device number 5 using dummy_hcd 09:38:12 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect) [ 274.847748][ T8438] usb 4-1: device descriptor read/8, error -61 09:38:12 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f00000015c0)=[{&(0x7f0000000180)="5a81d20a5a8609f797957827b552053fcd215ab03f1ba52f67bfe2593c60bd04718113747fe7d548c22f7b7e48b11e7c31cfcc25328e29c71407e619ed516214c656454dcdff87115f50815cc4d5d46a4beef29913bb492eae8248ffc450", 0x5e}, {0x0, 0x0, 0x7}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73697a653d33740039322c687567653d616c776179732c68756765030000000000000073697a652c687567653d6164766973652c687567653d77697468696e5f73697a652c6769643de6a55a98e8951ff6c24a9dcdac35d356edb64db73a2066fa1c369a8c41324791bac718174751a680a9a4bd2ffe3a5b4d94dc6dc5e7bd9940758c56cf985c27e26d89c10c6592e5778ad96ea4a873", @ANYRESHEX=0x0, @ANYBLOB="2c726f6f74636f6e746578741d73797361646d7f752c736d61636b66737472616e736d7574653d292d2c7365636c0000656c2c003049cd2df6c74853f9269d52b74a27d600d14350a30133b1789ac2652b55e77e8dc66a75f676485482e52335569c574ac13bdc6c26", @ANYRESDEC, @ANYRESDEC=0x0, @ANYRESDEC, @ANYRES64=0x0, @ANYRES16, @ANYRESHEX=0x0, @ANYRES16=0x0]) [ 274.968049][ T8438] usb usb4-port1: unable to enumerate USB device 09:38:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={r2, 0x4, 0x8001, 0xbd, 0x1, 0x9}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000700)={r3, @in6={{0xa, 0x4e22, 0x1, @mcast2, 0xff}}, 0x5, 0x1}, 0x88) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000280)={0x0, 0x1fffe00000000000, 0x1, [0xb5, 0x2, 0x0, 0x5, 0x401], [0x3, 0x4, 0xff, 0x3, 0x80000001, 0x10001, 0xffffffff, 0x31, 0x9, 0x9, 0x7, 0x7, 0x0, 0x8, 0x2, 0x1, 0xfffffffffffff362, 0x2, 0x7ff, 0x3, 0x0, 0x3, 0x0, 0x11, 0x5, 0x7, 0x3, 0x7, 0x1, 0x47, 0x4, 0x7f, 0xa52, 0xfffffffffffff96b, 0x3, 0xdb64, 0x6, 0x7, 0x401, 0x5, 0xfffffffffffffffd, 0x401, 0x400, 0xffffffffffffffe0, 0x74e, 0x6, 0x4, 0x1164, 0x6bfa, 0x596, 0x1, 0x5, 0x80000000, 0x1, 0xfffffffffffffffc, 0x9, 0xfffffffffffffffb, 0xffffffffffffffe8, 0x7, 0x4, 0x1, 0x0, 0x4327be8, 0x4, 0x7ff, 0x7, 0x820a, 0xfffffffffffffffc, 0x4, 0x8, 0xffffffff7fffffff, 0x8, 0x4, 0x80, 0x9, 0x3f7, 0x7, 0xb9, 0x5, 0x9, 0x3ff, 0x10000, 0x1, 0x5, 0x6, 0x3, 0x1, 0x1, 0xfffffffffffffff7, 0xf69, 0xfb12, 0x1, 0xe, 0x13e6, 0x3, 0x8001, 0x6, 0x100000000, 0x0, 0x7fff, 0x5, 0xffffffffffffffc1, 0x40, 0xfffffffffffffff9, 0x7, 0x5, 0x7, 0x9, 0xa, 0x1, 0x9, 0x63, 0xffffffffffffff80, 0x6, 0x1000, 0x4, 0xfffffffffffffbff, 0x3f, 0xfffffffffffffffc, 0x2]}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="40000000100001040000000000da130000000000d1fcf0909b8f2a5a0aefa43e6005339f6c89b95fa3ebfd2436b59e65262918290d3aff2689587d38c20e8faa4f8f1c91f256c4ee94562449f58c1a1c7b1f906e410ba798438fa69d3ae049dba070ffeb5025f3d2d1cda460fdb2221ffd969e58f03dce0566ca3cdd6ffe3fbdbf1a010b1808114ee7e803be5eb5832e4dc40b9b0f0668acbe332ab98d5e201d", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128009000100626f6e640000000010000280040008800800090000000000"], 0x40}}, 0x0) [ 275.160096][T10055] FAULT_INJECTION: forcing a failure. [ 275.160096][T10055] name failslab, interval 1, probability 0, space 0, times 1 [ 275.173095][T10055] CPU: 0 PID: 10055 Comm: syz-executor.2 Not tainted 5.11.0-rc7-syzkaller #0 [ 275.182012][T10055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.192193][T10055] Call Trace: [ 275.195552][T10055] dump_stack+0x21c/0x280 [ 275.200189][T10055] should_fail+0x8bd/0x9e0 [ 275.204844][T10055] __should_failslab+0x1f1/0x290 [ 275.210008][T10055] should_failslab+0x29/0x70 [ 275.214800][T10055] __kmalloc+0xbd/0x560 [ 275.219161][T10055] ? kmsan_get_metadata+0x116/0x180 [ 275.224559][T10055] ? tomoyo_realpath_from_path+0x142/0xc20 [ 275.230700][T10055] ? kmsan_get_metadata+0x116/0x180 [ 275.236109][T10055] tomoyo_realpath_from_path+0x142/0xc20 [ 275.241926][T10055] tomoyo_path_number_perm+0x2a3/0xaf0 [ 275.247631][T10055] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 275.253903][T10055] ? __msan_get_context_state+0x9/0x20 [ 275.259561][T10055] tomoyo_file_ioctl+0x74/0x90 [ 275.264482][T10055] ? tomoyo_inode_getattr+0x60/0x60 [ 275.269837][T10055] security_file_ioctl+0x10a/0x210 [ 275.275216][T10055] __se_compat_sys_ioctl+0x182/0x1100 [ 275.280826][T10055] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 275.287132][T10055] ? syscall_enter_from_user_mode_work+0x56/0x100 [ 275.293833][T10055] __ia32_compat_sys_ioctl+0x4a/0x70 [ 275.299306][T10055] __do_fast_syscall_32+0x102/0x160 [ 275.304760][T10055] do_fast_syscall_32+0x6a/0xc0 [ 275.309815][T10055] do_SYSENTER_32+0x73/0x90 [ 275.314514][T10055] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 275.321238][T10055] RIP: 0023:0xf7fda549 [ 275.325418][T10055] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 275.345184][T10055] RSP: 002b:00000000f55d45fc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 275.353770][T10055] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000c0185500 [ 275.361876][T10055] RDX: 0000000020000380 RSI: 0000000000000000 RDI: 0000000000000000 [ 275.369975][T10055] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 275.378103][T10055] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 275.386203][T10055] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 275.397525][T10055] ERROR: Out of memory at tomoyo_realpath_from_path. [ 275.404400][T10055] vhci_hcd: invalid port number 23 [ 275.411192][T10055] vhci_hcd: default hub control req: 0000 v0000 i0017 l0 09:38:12 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x10, 0x2c, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@mcast1}}, 0xe8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r3}, 0x8) sendmmsg$inet6(r1, &(0x7f0000003680)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x3, @loopback, 0x6}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="7dd127051b770b467de7e2cc333ae9f2e6ec47abd8b4d18a6220ddf11abbae5496c0a22a574994c867ca50f51188de1b41d23d89b325951cac2080c95fef24b806032aa1a8bb3ab9883f4c0aec9343d9bfa90a3d43581453880e2d95ceccc16f8bd3c8e09c563c421fcfcabb3813827635cc6f374ce1d8da9b5642e883a8b52403e80aa65a25360579c09932776d5f671dbc72d58398bacfee07e7a2e347bc306c3dec544d4af37a41605663cc6cc3f22b4f85376dde330918c5b96d16ac", 0xbe}, {&(0x7f0000000180)="1ff92fe6a46ab08aa70cfcce775402d50b102611d5724bec3e17e006f451b9b5db9d6d74993a066f3d4e02d8d4a6cae2ea98e36971f38fc0792c8e5bd110f7bf804c4027234935c906329012e00fb59f46c13f0f72a02c157d90f8005a1313a3fb8fd287bc2ca7409154162e1b8b268fb58514e0903be1044afb7c55614835aaebb455b9a852bd89e32d5493fdcc1715e1", 0x91}, {&(0x7f0000000240)="b1e82325e97d453c7e5839302346f17d184b301e2ca7812c3fa1847d925be39627863bfb6c59606f9e6a0c065ffc5644b9b3d070b100006092b399d9ddefce940ac2bc5ffb09e20e3fab38adff2959c1bd249917268480ceef07b9ee9a0f0d56133aa96a4e9a840021bd77162c9927d81d0e8a6456de94f91f6bb551206833c0dc1880a4dc780e43c1bd17adb97d5064266a59be74c6f95692122c46e319f9b346eedb3e7c17a69784777866d3b02730cbe3298b78ac2fdeab66f4a5026165cfa80537625403e78c6d", 0xc9}, {&(0x7f0000000380)="1e243c41ed854a7b1d4c636b05d6c39a560546bf741f8cf2db192609ea1d2220a81703d5aed7d325c5c3811123269e033b482c699dcbb133951fd40103bc49e93ce63b4dd4f8650b08b5b17f26703f2678ce1ea54f", 0x55}], 0x4}}, {{&(0x7f0000000400)={0xa, 0x4e24, 0xd26, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000580)="60f0844bb99c047f978acec34afbac06f67651186be2b83c6cb1d510aca744bc524d8f5e928db67aab63925659793409d2978397f3448564e508b1f7a9e0a73e613caf446e9d5cc6c359f6e291413e0fef7ca228dad31f8f00e81ff55961a516a94113c27f6a32376644a7c1303c95dfe3125a76a2c7ec0b1e0564", 0x7b}, {&(0x7f0000000600)="45e6c3dcc185f7149e314809395990df6f51d25ee070691066453511b438718892fe5257bdbe8b9e37c47adff97b8eca40def2fbafb5ff0cb88b8174c83e974c51531e52211be51f507b7050b2d395b8652631b411b95b90aa7cf6aded010de39c00b60c9239143ab64a55dad2f6e33fa5124cddc80024ecca359d43680cf43801c8b7cc318364979399a159ce975f431e450e5ebc9c609bbcda484872f2e93379f14375cf8b498e28aaba85fd052fd94fc5e892ee14dc25e89a11d3eace52c6d2947870028f9e5241dca89fbb82685be1a89ff4ef481d4c8c2a5bcd1bb2428d4b201d2e27dbd6d9fc7850bd0cb8", 0xee}], 0x2, &(0x7f0000000700)}}, {{&(0x7f0000000740)={0xa, 0x4e21, 0x10000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10000}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000780)="76d6177cd1f22521bafd6d577e94931cf71d238db6a95b7c0ef7e54e8b55e56ae9056eb73178c1ced5ba0ae1e6757772271cd3bde0bc4c57f2ca10f98132cab815c0e880b54a18", 0x47}, {&(0x7f0000000800)="eabc4db29f49160e79b4e7bee333377c2b2f006cbbe255d36b40fc0ac9f95fe8be59cc1b37faeb21cd04ce0a4c1a3b31b9fc82d9daf2", 0x36}, {&(0x7f0000000840)="dfc0023f2580cbf562f247121a06869d82f8281d40d8fef2e92a7069e60eb1c25c464f0927ab562bf71102c3272659fce29cc73cc2d8d49e283d7dc72bad6ee23af15782751b7359d64198243fa9e522cb23b42a9165adee9341976f4792bd8e16682a26ceb960523d377474f7db5a689325a321d0d7ca5f87a8b1639cc3161233461c9633bdcfe0902e168f27b61332de3f2ae807b3fb3b7c47fa37bbf6ca", 0x9f}, {&(0x7f0000000900)="9ec851d66f9dfcf8cc68a8e95337a61e751f83fe114feac5f9d0ee15ef09dfdbe5202153e110f6bd5df34faf2a5e1ac8bf8371e7c8a53b8eac920fb32674bee9f9721ca4c00e298257297a6df40b30bbdc03458729299d4cc7cbedfaf8d9588542d38bb288830d1bd5fbf5d8eed71b4f10b413ba39311b94a758cb7696311978a6151e4ebc9af29f3603a3fb49", 0x8d}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000019c0)="b84b43a57c00f362110afdd891d5cf17baf2028a0779f6aa988449c3e9d6d12005aa94ca8b55cc5f38e5aa0b7e788db46abe9ac1e4331fbc80a2524f15650c56057a88c8dfcc89be093af5e60841d81253d85823065bedee823372712ddca784f49d594586442469206028c0daafa79aa616ccaf7aea7f11c9b73584e0e3540cc2ded7f681a0d1eaa52516abdd50e839d37aeaed92e0a4b5104856ba4cb2647dea004a0a14bdeda37565c1fadc8a25e7a2b727e797f0", 0xb6}], 0x6}}, {{&(0x7f0000001ac0)={0xa, 0x4e21, 0x1, @mcast1, 0x1}, 0x1c, &(0x7f0000001b00), 0x0, &(0x7f0000001b40)=[@dontfrag={{0x10, 0x29, 0x3e, 0xb10}}, @rthdr={{0x54, 0x29, 0x39, {0x84, 0x8, 0x2, 0x1, 0x0, [@mcast1, @private1, @ipv4={[], [], @rand_addr=0x64010100}, @ipv4={[], [], @broadcast}]}}}], 0x64}}, {{&(0x7f0000001bc0)={0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, [], 0x1}, 0x200}, 0x1c, &(0x7f0000002c40)=[{&(0x7f0000001c00)="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", 0x1000}, {&(0x7f0000002c00)="825cc136c10b6ee7", 0x8}], 0x2}}, {{&(0x7f0000002c80)={0xa, 0x4e21, 0x40, @remote, 0x2}, 0x1c, &(0x7f0000002ec0)=[{&(0x7f0000002cc0)="1ed8b285aa9c7e7ef3505b5d3a1602f294e17d944a2983839c232042208d8f8f9a72fe8b07f9159de2cf27759cb458fb34192a336a0c461b58809faae9f4024f8de440c15bd3187658806162cd45d729adb789b3217ca0b26676e0fba8704f2b20655a64d67232373c2060840340b9774b1f6cd1c14a3c09", 0x78}, {&(0x7f0000002d40)="c0bd0c7b273265442485efab489198f5aa3e0a00", 0x14}, {&(0x7f0000002d80)="0aa99fbaa46d90e7f878d30469c0cab8efd0a6866d9432b04b22daffe5a32fb938349c23a828", 0x26}, {&(0x7f0000002dc0)="8149ff489df74bb12d7b6d481764968e6c5b74cc56204baf7dfc68b44638aaa0566fa67b7282bf0f2977d3ed1aec9fecb2d979b14d8d8e9a4c327da447dc9eb3f22b46cb2b230948c5b8574b320d9f2085b4313bac1785f7ab9e60c689d4280daa13bad1354b488548e8e08324961b71e39ea8f24cb7dd0330020533b05246aef4edd80b85bba89cf68ca3d31d61e4df14325d4018d1184a8cb0caec57b6bbfa284a74a9cde539e67fd7cb469296b58da96b85c371f7935f4652c468c2577a7c121ac1403c9f38150aefb315", 0xcc}], 0x4, &(0x7f0000002f00)=[@tclass={{0x10, 0x29, 0x43, 0x1}}, @tclass={{0x10, 0x29, 0x43, 0x1}}, @hoplimit_2292={{0x10, 0x29, 0x8, 0x7ff}}, @hoplimit_2292={{0x10, 0x29, 0x8, 0x6}}, @dstopts_2292={{0x34, 0x29, 0x4, {0x87, 0x3, [], [@hao={0xc9, 0x10, @private0}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x3ff}]}}}, @flowinfo={{0x10, 0x29, 0xb, 0x266a}}, @dstopts_2292={{0x12c, 0x29, 0x4, {0x8, 0x22, [], [@hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x2d}}, @enc_lim={0x4, 0x1, 0x4}, @ra={0x5, 0x2, 0xfbe7}, @padn={0x1, 0x1, [0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x6}, @generic={0x7, 0xdb, "5409ff16c13cfec4843b687609fbcdd1354fea76da1f1a8a2673e9bb63eb98a95b67472e3563879a8fc7dd8d66a9e88d629fb4c3356616ca6e1e3246851af9f0ff1050dfeb2105b38379e87217f479f3481378e42fb89cd6b8ec71d5d5444c561a24509abde4d65ff1839df5292e49e0a71119353f4c673eaf62cd31a85a4fe3b6b7f7ad37fb155de4f51f673f68614b927ff018c773bc7456ca6b801736cf6d0fdf0cde6fb3b3e666482d29ede69317b3107d48bf5cade110b735916e62e3a2a1414a1bad69b0bc4dd00aa2d99564bfc03ef75ca523555afc4ef1"}, @hao={0xc9, 0x10, @local}]}}}, @dstopts={{0xec, 0x29, 0x37, {0x21, 0x1a, [], [@generic={0x7, 0xc6, "fe7005093800e43932178b067cc50c8b3d694cd8776fbac795e61d376e167063c3e554198ba02cd916a7e02d7ebd6f049ab124ab3f02d0337523bd11d6d7a16528ac03fc40ead4a3a302baa7e63f45daf51bef203802f62369b1d999897d48a91a7234e68febc329599c6f92421dc61bf0bb3c5692fb06a42bfae3bfdf01b1292c217759f63baa05cbf991ede5e82e3c55f0b81e08b5bc2cef1182b28734abb5112c7fe6ff289a96562947cd3be725216d7219b3924074ddf0d2f9781df2c0f823ea543051ef"}, @ra={0x5, 0x2, 0x1}, @jumbo={0xc2, 0x4, 0x3ff}]}}}, @dontfrag={{0x10, 0x29, 0x3e, 0x13}}, @hoplimit={{0x10, 0x29, 0x34, 0x94c}}], 0x2bc}}, {{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f00000031c0)="b5a171dba84fad175d664258bc3a3d50121de660f5921259e0c1acc0de559d19dfcf1322d5db63ace4e3bca3b424b37b6abe6670b888ecb7cebd7893ac27eaadd44d31cf93dd3a7dd4904585328de40596b82484c24dca0964992f58ae1aeeb1f5d8b1520b0417e66623a04d0e363b11ebf22758750bd3c20ab83caa66622c937380d666ff3a46bac069014e89ef8e0285665761f4cdab94cf17bd8d71a57c71e0c445850a33c9bd1515c4cbd3c13d6adf68539421b4c27595e63d7d1abdbd78f19206dbf0d0b97a31d00b1c7ef64f0786b75bddca47235a3d16e66661c70a25a3968ca8b1648ec7963d70", 0xeb}, {&(0x7f00000032c0)="a289b1231110bc089ca6ff0c3dbae55cebe3781424a7d9f5e828df67ac98ab304edb22b1b6cfbf9d6e1456c5c88eeb3c2a551785da5ab6c0fe9371179019d0bd617b899382f9891e088d9acb77d356c5a1fc3ac7", 0x54}, {&(0x7f0000003340)="6fbd7e2630a01b34ed71055a3efeed1c64e7dd5769f50546708441abba0d7f81113ed8a0963723014c485a6d96a61fe89e1cdee4d628aa850f1b7543037d2dd43b175fff73041522d51df4295a9d0dd516aba97ea6be1bd9291b68182c4685e0b13db02e813b69cc7476b0e70381575be2d42fe5c118c00cbd96e10de123fb7a61", 0x81}, {&(0x7f0000003400)="b0d65db61db4e1e2a36ca0656d196395a304f2ac6aba78612327ee20e80e3e4af9523cf85ccdaf509e7a4c88b316b8f3b8b5ca37aaffa755aab4fef5a537d9fbefc45bc39a1817d28a96d72e0ea19e390ce69297d4cbe4324bf8840aa7c39081c9de7c202cb00846ea7e52", 0x6b}, {&(0x7f0000003480)="f7b65b6bc06bbfb1a0b7395f06f83af4e7817408c1a604fe69b9a3f2ff6378a6c9dbdb25197262d827a6cc19a63dc97c454399c2b13f83c1965f911b0311946a1f9a4c5615799f65282980b97bfa4b4b00c1a17addce398a8533aa7436b5c1f3e51c7707b13d0c82f1425a2931ea10947f3ac42cf0a8be2fb2203db108d3abbb", 0x80}, {&(0x7f0000003500)="daea83ba256c8998568c5c73c83a52860e27f747ce81d3343a99064d230455a75b3cc0e3b02761b80a6bdaab28dacd96f18de13b6d3fdfb8851bbbcb7cde550886c4e275ceae739523847f52702bceb783888c7514df10a83fd6b3b81bcc", 0x5e}, {&(0x7f0000003580)="df1981130aaad96686a7e788d26e45296589e7db529c8e29c3cb2d0101a7682f3f432b51549ed29230b706711735279dda150d4962c3c8491b0f95e1f3f3bf2fee1d92e7777dde4bcbf44ba086308874d14ac13efbd85d9bd844abded30a0c27aded6ad9d91c3aebd2c31027dc", 0x6d}], 0x7, &(0x7f0000003640)=[@flowinfo={{0x10, 0x29, 0xb, 0x9}}], 0x10}}], 0x7, 0x10) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) [ 275.731922][T10062] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 275.832964][T10068] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 09:38:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c0000002600010029bd7000fedbdf2500000000e956ff72fd2e5cd4c5521a407b2b0b891505cace58842293f6bddddb718ff445133abaf7792cbafa7a250ba3bbb29720e9c782614f0b468b22771289b23ac9e15ecee743b3830ccb", @ANYRES32, @ANYBLOB="0b0005000d001000eb99050004000a0004000a0004000a0004000a0004000a0004000a00"], 0x3c}, 0x1, 0x0, 0x0, 0x4050}, 0x4000) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_delroute={0x38, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_MULTIPATH={0xc}, @RTA_FLOW={0x8}]}, 0x38}}, 0x0) 09:38:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8a0464, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1600}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@smackfsroot={'smackfsroot', 0x3d, 'U\xbf\\:,$%\'\\{%5+:,'}}]}}) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r3, 0x0, 0x800000080004103) [ 276.336392][T10075] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 276.381686][T10077] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 09:38:13 executing program 0: syz_mount_image$tmpfs(&(0x7f00000014c0)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffc, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[]) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x13, 0x4, &(0x7f0000000140)=[{&(0x7f00000001c0)="384f280858ee9f27cd764bce88d9773f033b229c944baca6dbec794c05a9120fb493efdd6e5fe921c205041aba5aed8f4bafe9e1d19de24fa226a2eea9c114f8ac9476", 0x43, 0x2}, {&(0x7f0000000280)="dd13a4bb0eebd24d8f0f23f545c238f6ba35cb8433b3521cd654763092892a933f0859b88e22271d542f104f9eba313c16c70eb66641432fedd0c2cbb57835b8db554249ec179a553ad0b961607411709d2baf1332edd90faef4dd1f938a4d524b2c6b885833fffc67d8d43964ae69ac7d8ea0ec79c18f0d66ef2cd29cee50eee2bb9b90eb93680b5d528b94e58c569a83d52ec35f7b3dcc978fa6b69ee70b01681f8f33b48e5f44435d4522a17b71d0157108589b2d7422f784b823ff243b7f016a233e165ca1e28d017c7d87f7de42b52e70b5485cdd0902f104cfe1e2c90df6b479c49c8386caf10757617f0af16d3695", 0xf2, 0x3}, {&(0x7f0000000380)="0a62c34667c27d080e908102faf46952fd0ea478afbdbbe07bf8509a272a25da009e2b1e7e3c5bbe7f061888d06cf0b37906d382df7cc942844c2447f9397bfc72935daa5498fcdc12174cfeb5136fcf1b5fe594b0f22d724835bfbdb95f453e06d543ac51b6efbed8d72791b4ece1933cd95b9f89d1b8d58e5057d7c6d3e57cd9a57b96407da705b0b2a2420fb866b530cc27eb4d990eb6dd91c64e646e593c5161f207d8aff0ef38b2242857fc67ecd1a5c1666af6fdcef81092c67da1eb2a846436832d8bc2b9583d28a8f7ca5f3643a54bb8f82d9669dc5debdf4159a441196f71821e165dfa33955a00bdd7def81c130cf8c9fd6d", 0xf7, 0x2}, {&(0x7f0000000480)="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", 0x1000, 0x5}], 0x44000, &(0x7f0000001480)={[{@fat=@flush='flush'}], [{@euid_eq={'euid', 0x3d, 0xee00}}]}) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './bus'}}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000013000100"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140000000014001680f8e944f5f9f51f410d89100001801900"], 0x48}}, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000015c0)='./file1\x00', &(0x7f0000001600)='trusted.overlay.upper\x00', &(0x7f0000001740)=ANY=[@ANYBLOB="00fbe3020952eee39e8504b92ad7dbb2c8f32f6691251a0fe99b98eae877cb2388fe109c5966f3e88e15c9b835b14015b422d22138bcacb5f284a441f695338354d29c9ac675fb086f841c3ab8a2ad45c2a2cc636f40801fc8373d488a9dc86b35c9d3ff2e0943a0715eca44afcfaf2c136b819c90bb6cb31c52f40171e5673776720cdac936453c494be965e92da48814041a1fc64ecbf3fade6fa26a04063c9043d484999d70d89a4d785451d1bd4e279d4f75bac46156e90dfafedada85ffea074d1c71e5bd9ddb632d25fe1f39fa60fa8fa54cdd248347327231d1beaa48b15ebc671b"], 0xe3, 0x2) clock_gettime(0x0, &(0x7f0000001540)={0x0, 0x0}) futimesat(r1, &(0x7f0000001500)='\x00', &(0x7f0000001580)={{}, {r2, r3/1000+10000}}) 09:38:13 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect) [ 276.936615][T10080] loop0: detected capacity change from 8 to 0 [ 277.048696][T10080] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 277.052732][T10080] tmpfs: Unknown parameter 'àÉd°H(žÄëéóÓø2o¶^g>üúæÉ ÊqA•ši– ¾lLÐÞ¶ê4AÜëëÆ“%™&y÷ŽñÙ8‘\vúL¦]“' [ 277.064279][T10086] overlayfs: filesystem on './bus' not supported as upperdir [ 277.202572][T10089] vhci_hcd: invalid port number 23 [ 277.202626][T10089] vhci_hcd: default hub control req: 0000 v0000 i0017 l0 09:38:14 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="d40000001000390e0000000000efff0000000000", @ANYRES32=0x0, @ANYBLOB="030000050000000008000a00", @ANYRES32, @ANYBLOB="ac0012000800010067726500a000020008000000e00000090500170000030000060003003f000000060011004e2c690005001600020000000500170000000000050008000000000008000600ac"], 0xd4}}, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x40002, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@newtfilter={0x1a4, 0x2c, 0x200, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x10, 0x7}, {0xe, 0xffff}, {0xfff3, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x9}}, @TCA_RATE={0x6, 0x5, {0x4, 0x6}}, @filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x164, 0x2, [@TCA_FLOW_PERTURB={0x8, 0xc, 0x6}, @TCA_FLOW_ADDEND={0x8, 0x5, 0xff}, @TCA_FLOW_RSHIFT={0x8, 0x4, 0x6}, @TCA_FLOW_ACT={0x140, 0x9, 0x0, 0x1, [@m_ife={0x13c, 0x8, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x1c, 0x4, 0xd, 0x6, 0xffff}, 0x1}}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x6}]}]}, {0xde, 0x6, "9e721fc39a8c647b4408de38a1ebd1e6847bd2281bb3737d8fea5a5ad5fa1bd5a0d9ef693f9e556d4c3c1bf53bd6059f78d6b9a949e7850f12173184abe009f622c3606b8831cec784311ea88f95fb7b9cf53e13bbabb38a7679134e8b58ffcec199f0bdf98717d0c803c89a7f0cfa8a94cf1a34ab30afef1604906aac7c5a8ae6b0c3c41d2e1110879cc4093a7bf60d5ec5af4d098249f22f8ed3dbfc0e70d714a42a56fbcdaa075ab2aa2ed7d25807adf5c4adb78254771d9b18b5670019103e833ff6fbdf381428b8c15580bd879e6ac04e38159d9f6d53f8"}, {0xc}, {0xc, 0x8, {0x3}}}}]}, @TCA_FLOW_ADDEND={0x8, 0x5, 0x3}]}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x48080}, 0x1) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 09:38:14 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000580)='reiserfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='errors=conTinue,\x00', @ANYRES16=0x0, @ANYBLOB="9e300e08d258f6ab45a3e333d5cb1ddc6863341eb2121e6281143a2efdd92eb0c2f35f571832923004e1b3e0d4d7879c76025810ef6ba0006bc75ddc637d8609e40b3fa3d5563933a120fe5d26f2aeee64e3bf308416f02972f9b3a57e32963caf9b2b55436aa725fe4bdbb7e53426176a21a52513ddd859e15c4b43349a9ad53d35a22cc2902cde4c24112ab86e4e7eba8f3041fa9c8687d7d0e9caf4945ff750103b693b73d51057", @ANYRES16]) r0 = syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x1000, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="dd078740d210aae590843b0b66ec6bbc3e01ab1ceec4d75811e48d95389a4f36f4ab86889870a9eb332a1bc3d16aa1e322755631ec097976fd187df20b38c331927663cbfa5693e6826d586b9a477521fbcb35441debc1363ac4591e465626770f1b7a71ecbb55f510fd0456365c9a9e70a93624a0969d19c4ab0c0797a238f92f50d123c3f2514b1ebb986cb083d661f82fe459240d99baca2452c6c7a4df7f105c66b7439347024a365ec23766465102d3eb69e84f3f6a767c0577771136867f77ea575034", 0xc6, 0x1}, {&(0x7f0000000180)="2b9d2560ecff8ea4b89ed0cf0c180b814d7866849563cdafb0543a7d7762bff81f74d88ed410838c531771a2fe0ac4e9f063e6b98b06b9a492801172096b0bfae4d059752371c9d4bc6c3704ff9552fde1585e792bd7607042f95c59b8c19960d24d117a71278573a369db5cd9868c73045b3103e7de8d1eb8f4aeb176600a5fcb58ec5ed369dab0203a0f06b15cea42856b0bb563e523ff7fc461218a7c1ff9", 0xa0, 0x1000}, {&(0x7f0000000240)="c0cdb48349c81b3a0164a2d8bce8921a3590743f0e1545d3f88616600c3e3bb124ea3cf5c587f080bf7eb04d1eec085d3429580357e8b403aaf9", 0x3a, 0x8}, {&(0x7f0000000280)="071b115f0395c6bd974dc0d25d396851568a77621883a2f15ca8f42c983eee4cca077982260146787a4ae4343200d5895c7a18be76c7e868a9e0830ecd2b924459631c19ac010fea96da40e30a08848f5359ed4ec8c70bb6209f6267062b5d17cc913813fc03e329f789dd12b2d65eb1fabcd32f70885d33999d32659d8ec519bab8debc4cde08fcda1bbddd674362933d954833e946adcd5380ee", 0x9b, 0xff}], 0x900028, &(0x7f0000000380)={[{@source={'source', 0x3d, 'reiserfs\x00'}}, {@flock_write='flock=write'}, {@source={'source'}}, {@source={'source', 0x3d, '{\x14--+!-'}}, {@flock_openafs='flock=openafs'}, {@flock_openafs='flock=openafs'}, {@source={'source', 0x3d, 'errors=continue'}}, {@flock_strict='flock=strict'}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) read$FUSE(0xffffffffffffffff, &(0x7f0000000c40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r7 = geteuid() r8 = getgid() lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000080)={{}, {}, [{0x2, 0x4, 0xee00}, {0x2, 0x5, 0xee01}], {0x4, 0x2}, [{0x8, 0x4, r8}, {0x8, 0x6}, {0x8, 0x2, 0xee01}, {0x8, 0x1, 0xee01}], {}, {0x20, 0x4}}, 0x54, 0x1) setxattr$system_posix_acl(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x0, 0xee01}, {0x2, 0x3, r3}, {0x2, 0x2, 0xee00}, {0x2, 0x2, r5}, {0x2, 0x0, r6}, {0x2, 0x5, r7}], {0x4, 0x6}, [{0x8, 0x6, 0xffffffffffffffff}, {0x8, 0x4, r8}, {0x8, 0x0, 0xee01}], {0x10, 0x1}, {0x20, 0x4}}, 0x74, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) r10 = geteuid() syz_mount_image$gfs2(&(0x7f0000000400)='gfs2\x00', &(0x7f0000000440)='./file0\x00', 0x7fff, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000480)="5427cdb6526fae29cff7cf7d1ce6", 0xe, 0x9d0e}, {&(0x7f0000000600)="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", 0xfe, 0x1}], 0x20002, &(0x7f0000000700)={[{@quota_account='quota=account'}, {@nobarrier='nobarrier'}, {@nodiscard='nodiscard'}, {@ignore_local_fs='ignore_local_fs'}], [{@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x2a}}, {@dont_measure='dont_measure'}, {@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, ']-'}}, {@fowner_eq={'fowner', 0x3d, r9}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'reiserfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x100}}, {@euid_eq={'euid', 0x3d, r10}}]}) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000080)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}, {0x8, 0x6}, {0x8, 0x2, 0xee01}, {0x8, 0x1, 0xee01}], {}, {0x20, 0x4}}, 0x44, 0x1) fchown(r0, r7, 0x0) 09:38:14 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x2, &(0x7f0000000380)=@usbdevfs_connect) [ 277.861586][T10095] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "conTinue" for option "errors" [ 277.861586][T10095] [ 277.870294][T10097] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. [ 277.940617][T10095] loop0: detected capacity change from 16 to 0 09:38:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 09:38:15 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x10, &(0x7f0000000380)=@usbdevfs_connect) [ 278.563389][T10097] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. 09:38:16 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4c00, &(0x7f0000000380)=@usbdevfs_connect) 09:38:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 09:38:16 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'batadv0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000900)='/dev/dlm-control\x00', 0x400000, 0x0) openat(r0, &(0x7f0000000940)='./file0\x00', 0x4400, 0x1a7) r1 = getpid() r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = getpgid(r1) sched_setscheduler(r3, 0x5, &(0x7f0000002140)=0x1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r6}, 0x8) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000002180)={@loopback, @mcast1, @remote, 0x1, 0x2, 0xffff, 0x100, 0xfcb1, 0x2200100}) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) sendmmsg(r7, &(0x7f0000001fc0)=[{{&(0x7f00000000c0)=@rc={0x1f, @fixed={[], 0x11}, 0x7}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="615237b396d460655b93359001ce0d0ed306c596c0c68ec9f1f27e4e09f6a385ab20b80be9742c3cd466e39d53e971d643a6f10d28bc4c6fd1d3b3015cdd6a47c196b394b3bc7a4f57310fdaaedbc185bceffd4efb5b6125bdff16fb13f2161d78290abb7c7541cb9e489e97dc92176923ace33a1082535ae05b6409fcd321195ae1d3991a08f09db681cc7dbb70b04c35393bacb6cb9c18b1736f18616ff4ca1d6112c2ad6ede77", 0xa8}, {&(0x7f0000000200)="81320341a2e6f60e7a373b3d310a6fe508ae42284dadacb57352a02854e800bdca18d59d61344be2a1dcb51e65948dbdd21629b6fe524f30d3e27a22d425e48ca637f2e0e31ba011f8bf9f82fb87cdfa741f609fc32ca3c3c7132b1c9bc12c911d66779575e7602802e69a202da51826438430496ac97fa62bf440d145afaf7d4eea644977be072a3f83455bec60e2738f40c4a329bb6a3d7bba511961dd4607387ff278ded2679e32e71d4431c66766fa449a09f80991f8823c9f9acb3aef16d9c5f52a00b58e14ae811a78cbfd4c144c61906e7175a8f9809f7a5c82d1a59b60a6733c727c1d63642fe6616ebf8cc5ee205ede", 0xf4}, {&(0x7f0000000400)="e786ec61033ee483f3ba7a9b12bc29e90c3a5353aeeb49cca51fc3deda804734dbb08eae9ce672914c95fba949a2a60d75628f8ffed4a1f4d9ff1be8fc4e057c1d15e1c8f2161cc0c551bf6572e3ab3e52d5c70e1279e58817da5d32fec94d8801635cd55169ebdf56e38c7c2ae13264b3814f86c5c53ffecb183ad3fde06a66242098d1cc7c61d35e8d10659c1c7d0ee931197f7f81b8cbd7d723291ff248243580ecf652a6e4f1d71423afbc5f0f2fe45df2013f4e24b4d98216309bda31091a350647839fc5fcf868c951a8ddffcf27b849ca688bbdb83d20cf697bd5206e99fe23ae574d32e0ea6836d267b11867b6213dece9", 0xf5}, {&(0x7f0000000500)="a6f761835908a9bdf91b21aa35b99fcf6674c9e1e49a565655e3e1a588b0951e4c34e86481b2db47fe2d2b6fec33e1087d42d69a63681dc2a38479a78f6b7f2db5556e729470cc3531874040d3e07ee1a48a00d826c1b4308f44be01ff43a685b9b3da0a49dd9fd5e5c05c03389e99075b20d9d1e80425b400"/132, 0x84}, {&(0x7f00000005c0)="e7d7052177daaec5fdc9e3edd835322b4c0701d6b636610a1fa574b7c664ee6bade1ccab3c54a46544720ec9040c3b92591cf5206ef1da73df65f775c372e803d3f6f7880f9d017ab5d140faaca5833a590c00d0277528b7ec3f7c9812bb725da5fa1cf91b10173b3a07288418e03add4bad1c447f9ab82fa6702b2cd9fb231c55e37072564dc7745dbc25e9b6", 0x8d}], 0x5, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c0000080000000036000000d2daee2b4ee7d0900fc77c588450858dae5d1f93c7d980827c19c1b0fc7ac910556d230d8515f0ea5e1353036d7d818e4046569f93843051513a0bf3458812061ab53c66394b262314"], 0x1c}}, {{&(0x7f0000000680)=@pptp={0x18, 0x2, {0x3, @private=0xa010102}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000000700)="64bfbb4a47c3316a424e0e6c98d74cce408cdc5feac4f0645f89dd0ceb809803ee3a343622af3f1d203f741867b5ce4cc7", 0x31}, {&(0x7f0000000740)="41a1639a2857eef49be6d0e8f9e486c7b3276d746f3a20d20b20d6ee2213258067417fb5632835aa29510752a9913b4eac138c588f9feb5a976370207dddc249f58cff6c3b87d5202d09ad7fa0cfcc065e74c25e3865b6dfb65c6c75a0dc39c334120bc160121d6c3cd6607dd49e2e60bfb2e718c0f5da6a63e0bf2beed14f874c95f9c494589e9126c46adaae7e7a145c7ae6616a798b8da37a2d3eba47a10584d6991969979ed2f149bfeba17309f4e6af9342bfebcbebd616719a88cc662b4b10c8468d97e7211e32e3f7a5bc684dd35775b8", 0xd4}], 0x3}}, {{&(0x7f0000000880)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x64010101}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000002040)="e62414a98a6a4acd178eb65c9e412b0cce580eef96e338f880906a44f3b79d377d6cccb8db0bd94c52cd828ea29a96cc03bf38b5fd766f2c14527d986148c2d53505a92ebb309307e0c8f438ea0f56eb3a03a222abb658bc", 0x58}], 0x1}}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001a80)="64b12f25d38e3286a72937744c9f08fe8298dc74480122b3920baaf038c3efc627f45e796ed35ee370f17caeefff8b3ea77ac2c85b5453339434f5d4de7659ce2782057f99449dde95665a3f64847c16033e360530631d2666a892d9e30495c9d25ea58d6439b784dd793984ddfe57e2d772f1e8795c94570c49b2c9265ecb223571707509960dc14d876645d25ed7d2e984fdc8cab0525d1971050ea70f24", 0x9f}, {&(0x7f0000001b40)="6b7be180760ea7108f464c060fe8505f718cd31119e891a0fe82d3d5b75dd353717f0dc84d94b4d0da1934f8c3f214e17850480e153dc57c9ebdda0e3d6939cbaf8e52215eb15dce98fbe8d9923e7db78d3ed9ea5dc737450d4722954dbcfb54de5af84b0cb23995ab1d50462aafa253ec645bf63e72a3c868ac8cb355d64a4acbb5498aa3854dba6299e5d4aabfae20d9e54022facc57df2c9c81fb2062", 0x9e}, {&(0x7f0000001c00)="e748c396d3e9f85d2b7f08c76121d01440ce4658293624064699fce7ec37811bf84e26ef1c92a13067f9110e4249732d7293c3ad79e215deef64945ac357774f2aabae6fa0196c5cd03563352ca009109ed5c849f4da0d7d40af363e97fdd8554c5017454c21aec9a3a0ced38eddac1de6903efb5d6f11891ad4ef813c270ba6139257e7b201fb389c54c51f7748", 0x8e}, {&(0x7f00000009c0)="73f378e1d774bca5040b0e348d9cadde7c931fdd83521386def8412161df8718dc2578d36a8ac6bf18945d3b0bf5b45f6a4d2d43e86ab510d818e2f5b9f04d7a7fa58df3d64e3e36879a14423e58af8aa586020ccab1b7fe8fc5acd567b48fbe6de7c121f219733ea5be20fc8d31ae7b7fd6eefe8b90952912f128", 0x7b}, {&(0x7f0000001cc0)="62ef2f0b98cbf5293cb8d595a72c1250f5e7cf01ccff526e9852e6a2fa6a8514f564fa71d981273d92692ae8d83536a8ec9b45f2a61e6b5fc4ceefefd2023e193faa7fffe103d50e413b468f315cafa589a9e373a7de5b354de2c42c4c42d533dd86af6d3eacf5b388ada83597a6ec8339822047c3d8d6a89567182bd258ae18f3206f27aef4fcb3c45ffb20e754e8b9ead01181b5c5693db98e04dcddf7b98a65788fcef1394e8961", 0xa9}, {&(0x7f0000001d80)="fb3fc0", 0x3}], 0x6, &(0x7f0000001e00)=[{0x34, 0x1f, 0x5, "7cae9a7c8288708435bfe3e6ed88e59075b5492b6f5a43cd3a42c4b067732e4b8d2823b6a9f799ba"}, {0x2c, 0x13d, 0x40, "ef8b145c1737fc9db41a708866dc9e254398d7b8be60ad238893035a3b3c"}, {0x10c, 0x88, 0x7fff, "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"}, {0x34, 0x1, 0x81, "134282a22e8959d8e11a3e227ebaaaebb211e0fa450e3627b0bfe93fb0c97c365ed136b8058b0c"}], 0x1a0}}], 0x4, 0x0) sendmsg(r2, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) 09:38:16 executing program 3: syz_mount_image$ext4(&(0x7f0000001700)='ext2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000003bc0), 0x8000, &(0x7f0000003c80)) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x104, 0x0, 0x8, "31eee5213dab59ce73cffbdf9a575af5", "6068490eb668d5968bb1eb8dfe46b7635c454cc35cfb6f0486e690afee2d8a10e219852dbbaba99d72ff5b7df0c682dc01edbf341fdd878bc11df28151472394e3d5458b16b2c223f0c7df0648adc144dc9f4e0c9144839427297cb80aa2c8b47d2a05ec55e436df8777c4739605d9cdc31ca36733b816b4c4ef643460ac3190d31852c7d3f6e0c4207344259404f3eea9e67495e2b7a0a1bbb4faec0686294c638fc4ae759302d791ee6b0e32901fac81ddcb57914ee853bfdf067bb941873fcd03dd6ef5c5de4dcde5291171ae102a512a27f7aa011694cff4b762b1f808773c6696347d4b4d5778196b842de428"}, 0x104, 0x2) 09:38:16 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4c01, &(0x7f0000000380)=@usbdevfs_connect) 09:38:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 09:38:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 09:38:17 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x541b, &(0x7f0000000380)=@usbdevfs_connect) 09:38:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000880)) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000840)={0x145, 0x80f, &(0x7f0000000440)}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0xf801, 0x4, 0x3d0, 0x10c, 0x1ec, 0x0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0x104}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x41c) 09:38:18 executing program 1: syz_usb_connect(0x0, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="12010000c13a4a20d112f23ff562010203010902290001000000000904000000ff016900052406"], 0x0) syz_usb_connect$hid(0x6, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x10, 0x1e7d, 0x30d4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0xd1, 0x10, 0x91, [{{0x9, 0x4, 0x0, 0x1, 0x2, 0x3, 0x1, 0x0, 0x4, {0x9, 0x21, 0x1, 0x9, 0x1, {0x22, 0x849}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x7, 0x9}}, [{{0x9, 0x5, 0x2, 0x3, 0x8, 0x0, 0x80, 0x3}}]}}}]}}]}}, &(0x7f0000000100)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x110, 0x1, 0x80, 0x81, 0x20, 0x4}, 0x56, &(0x7f0000000080)={0x5, 0xf, 0x56, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x3, 0x8}, @ssp_cap={0x10, 0x10, 0xa, 0x6, 0x1, 0x2, 0xf00, 0x8, [0xc000]}, @ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "bf0d924a85ada323704093d7372a7d77"}, @ext_cap={0x7, 0x10, 0x2, 0x8, 0xc, 0x3, 0xfff}, @ssp_cap={0x1c, 0x10, 0xa, 0xf8, 0x4, 0x5, 0xf780, 0xff, [0xff30, 0x0, 0xffc0c7, 0x1bf]}]}, 0x1, [{0xbe, &(0x7f00000001c0)=@string={0xbe, 0x3, "4978d692b3ca103b1b0697539e15af81f4115f1d19670a2220a2f74eaf9b9d569028d5d3670640618578c85995e9e48887af19906669c401ce7a4652104ab5dba15ffb3b5d2f6bb5a182fca0e4b48e5e404187f474c117e26d718b2ae8e9a52d9fc225614fac608c893a7c8cc2263a7f9f0d2892ed259462c69ff2c8c9c865f4af5488433cc80d737309ab9edc8c51f20faea5fc602dd8b59281ce8ccdbf862a91aece87699d385a406a2f9464d13ddc0c55b60ad2f1bcbd96de3a30"}}]}) syz_usb_connect(0x4, 0x457, &(0x7f0000000280)={{0x12, 0x1, 0x201, 0x37, 0x97, 0xb9, 0x8, 0x45e, 0xffff, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x445, 0x2, 0x81, 0xb3, 0xa0, 0x0, [{{0x9, 0x4, 0x73, 0x9, 0x8, 0xfb, 0xe2, 0xe0, 0x26, [@uac_control={{0xa, 0x24, 0x1, 0x992, 0x3}, [@mixer_unit={0x5, 0x24, 0x4, 0x4, 0x6e}, @mixer_unit={0x5, 0x24, 0x4, 0x1, 0x1}, @mixer_unit={0x5, 0x24, 0x4, 0x2, 0x1}]}, @generic={0xdc, 0x1, "800a2ee5d499553a5decd5693a187c666a5fe7f56032d91e4edbc710313851cfbf50a84b86f4984cb6c80a4507f13259514459bc0fb5d59812ba78cdd373da57b1a8f472ec399c3e9863ef7c281161f8ca281e3eb54f7ea500225deebdceb3c7a9db5d0e5cb818f499e0c7feeb0cb55df4c25e76b4e4f3d3c19f221257c3b8d83bfe58f0cd6f083f6fecacc11efce33d6b692ff9068dc7f0bb2f9cd0196650f78afa53004ac8712b242a2520cddc8c7edde9d0c68c0a62fa75e6ee2f15216f8067cd2232b48e09f6c6aeb1a5c5db5aa7d01943c5ac4cfa57ef59"}], [{{0x9, 0x5, 0x1, 0xc, 0x200, 0x3, 0x0, 0xc0, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0xb4}, @uac_iso={0x7, 0x25, 0x1, 0x83, 0x7, 0x3f}]}}, {{0x9, 0x5, 0xd, 0xc, 0x8, 0x80, 0x5, 0x80}}, {{0x9, 0x5, 0x1, 0x8, 0x40, 0xe8, 0x5, 0x80}}, {{0x9, 0x5, 0x1, 0x8, 0x10, 0xff, 0x8, 0x3, [@generic={0x74, 0x7, "b0840a17ab93c68a69eb784b720c617e3a20fd41e311ea0dc83912110b91e268c95cd1bc2048be47fc5c5643f8ffc51164f138a409dc5ab98ef75eaae9e134e8bbc2834aa04035a5f82b83f369b76b76d4d5b43a23450c3b27817baeaa7117bc8d8607ef6406847fde733f6018217f5ac423"}]}}, {{0x9, 0x5, 0xe, 0x0, 0x40, 0x2, 0x3, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x20, 0xa5b4}, @generic={0xe7, 0x23, "ca78094d7b232c5508e55182bb00008907f11560def25197ad647b13524c458eeccba6ef47458e0564881be6c5f6c791c6c7954381d2dabd33dc370b0fa282bd87eebc0267b4fe1130b60cccf83b3c7ee4b92ec69557b1fd0736f81a7b6baadf6ac5fd07de42bf39e0b0be4d3e583c5f52a324b555f0265a9a7f7c75da8af14a7409d5ba01a67eac5061216b1b35b92b090ba2da221fc1a95099a3bc22b77a041407dda4925e6fa7771d62e058b850ef3bcca4b6c366a245bd799231b9fc467d5eec16da47b69313cee01f352150f7d99057a21cd35a0fec5b6599e3da20aa0e620a22cd17"}]}}, {{0x9, 0x5, 0x9, 0x0, 0x8, 0x1, 0x3f, 0x20}}, {{0x9, 0x5, 0x3, 0x10, 0x3ff, 0x1, 0x1, 0x4}}, {{0x9, 0x5, 0x5, 0x10, 0x200, 0x7, 0xfa, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0xff, 0x8}]}}]}}, {{0x9, 0x4, 0x4, 0x5, 0x6, 0xc1, 0x64, 0xda, 0x80, [@uac_as, @uac_control={{0xa, 0x24, 0x1, 0x5, 0x69}, [@selector_unit={0x5, 0x24, 0x5, 0x4, 0x3a}, @extension_unit={0xa, 0x24, 0x8, 0x1, 0x2e6f, 0x2, "62c9a4"}, @feature_unit={0x11, 0x24, 0x6, 0x1, 0x4, 0x5, [0x8, 0x4, 0xa, 0x2, 0x2], 0x1}, @input_terminal={0xc, 0x24, 0x2, 0x6, 0x205, 0x1, 0x7f, 0x2, 0x20, 0x80}]}], [{{0x9, 0x5, 0x5, 0x8, 0x8, 0x0, 0x8, 0x20}}, {{0x9, 0x5, 0xf, 0x0, 0x400, 0x9, 0x5, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x80, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x7}]}}, {{0x9, 0x5, 0x2, 0x0, 0xc69c1749040a2c41, 0x0, 0x81, 0x16, [@generic={0xf0, 0x24, "bdfc8205ff3b7f2441a62758d8165419e093a1b40ad079e3973701a56cc5c9583f3c1d665919f14956f22dcc760d8a87b2e1ae5dc7458d05b82996e0e2be853509f05babaedf6ca514504a371158224586a2844086fd8214173eff62a5443e2beb3e83615fabd0262251d8b05482ba9ceca8b146746a3fd3416de44d99f4e30aecd6935cd5e9d169f980b96c869408878af67ed8a90df2b10c380d3c8b4f61e2ee77097fe327f91fa342ee16a1c51d30a6c8370a0c2b6efd05c35ff4601523ace5c138c981bb2d84813ad420182b4c0194482d13bf885f386ff9397862e6e9d99084418d5b95912287f19360bbb9"}]}}, {{0x9, 0x5, 0x3, 0x0, 0x3ff, 0x5, 0x3f, 0x4}}, {{0x9, 0x5, 0xd, 0xc, 0x40, 0x20, 0xfd, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x1, 0x8}]}}, {{0x9, 0x5, 0xb, 0x8, 0x8, 0x3, 0x0, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x9, 0x200}]}}]}}]}}]}}, &(0x7f0000000900)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x310, 0x81, 0x4, 0x8f, 0x40, 0x7}, 0x60, &(0x7f0000000700)={0x5, 0xf, 0x60, 0x4, [@ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x0, 0xfb, 0x7fff}, @generic={0x43, 0x10, 0xa, "06b508f79bd7e29ac727c0ac3290bab997b5b386f42c3ab97c088c4506c7cf5e89d1e7645444a04d84420af3518832f25720488ee28423508f3fc4a5c142bd74"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x40, 0x3, 0x9, 0x2, 0x4}]}, 0x2, [{0xc5, &(0x7f0000000780)=ANY=[@ANYBLOB="c50386efe50b88b025180bd3f63d743ccda343210f979e0f624f0c74f5a5fd93db94b843fc380c9a35da974b063bb5bb3f0d0820c9bbca602b86ccf83c94ae794f92dac93ff3f04d4849e363b2d4b4903be6911b4d52b7c12621e1b07a5033e486df7de6b441f9dfcb34b4dd3d5aa350063226cc27abfe14ee0a76cd272895f9cc3b46de985ce4567d354b56de51391db7e41d72c763ef3d66dec388e1161515520621de57359375a660a41f88edef7fa3cb886fa5e34389280e316694eda07408528b98bd"]}, {0x69, &(0x7f0000000880)=@string={0x69, 0x3, "65d9f53e87813ce51dd96fef4ac379f79135bb008a966f7ea7822b7c5a8ea334b639e3490431d315e87bcb0e5837b8a572ab9f02b3ac3f21ccbe2b36219466519804ce61ecc29e1082d3f17a53b5c4e4a06a0b6637aeb52f8a2cfba01ce09cbee49e977d9790f4"}}]}) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000740)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x17ef, 0x6085, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$printer(0x3, 0x36, &(0x7f0000000d40)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x588a95d79679e9b7, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x8, 0x60, 0x7, [{{0x9, 0x4, 0x0, 0x3, 0x1, 0x7, 0x1, 0x3, 0x95, "", {{{0x9, 0x5, 0x1, 0x2, 0x0, 0x80, 0x3, 0x80}}, [{{0x9, 0x5, 0x82, 0x2, 0x40, 0x7, 0x7}}]}}}]}}]}}, &(0x7f0000000f00)={0xa, &(0x7f0000000d80)={0xa, 0x6, 0x251, 0x8, 0x87, 0x1, 0xff, 0x8}, 0xb, &(0x7f0000000dc0)={0x5, 0xf, 0xb, 0x2, [@ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x2, [{0x4, &(0x7f0000000e00)=@lang_id={0x4, 0x3, 0x812}}, {0x82, &(0x7f0000000e40)=@string={0x82, 0x3, "302a268d46f55c703583ae1475d8b7af4b9dd2712fdfc3d38028541d156855af2504080dcd8a51f7ff369e6ebf9842bab102e02434e70b37a8d1d69ffc6c5940ccc43a908c5db70e1af2038a8db00bcf9cf0b87a9fc55e345327c67b0048ede7e47fd6288ded814b52f6ad72b016eee550b26968c22ac7ca57b087ab804cf24c"}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = syz_usb_connect(0x3, 0x3fa, &(0x7f0000000f40)={{0x12, 0x1, 0x110, 0xdd, 0x92, 0x92, 0x40, 0x5d8, 0x8105, 0xe66f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3e8, 0x1, 0x7f, 0xff, 0x20, 0x8, [{{0x9, 0x4, 0xdd, 0xc8, 0x10, 0xf5, 0x3e, 0xfd, 0x36, [@cdc_ncm={{0xb, 0x24, 0x6, 0x0, 0x1, "6100f36ff0c0"}, {0x5, 0x24, 0x0, 0x3}, {0xd, 0x24, 0xf, 0x1, 0xfa, 0x5, 0xa2ec, 0x8}, {0x6, 0x24, 0x1a, 0x0, 0x10}, [@mdlm={0x15, 0x24, 0x12, 0x8}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0x9}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0x7f}, @dmm={0x7, 0x24, 0x14, 0xb65, 0x5}]}], [{{0x9, 0x5, 0x5, 0x10, 0x200, 0x4, 0xff, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x42, 0x9, 0x7}]}}, {{0x9, 0x5, 0x9, 0xc, 0x200, 0x0, 0x4, 0x23}}, {{0x9, 0x5, 0x1, 0x10, 0x10, 0x7, 0x3, 0x4}}, {{0x9, 0x5, 0x0, 0xc, 0x40, 0xff, 0x40, 0x1f}}, {{0x9, 0x5, 0x0, 0x10, 0x400, 0x3, 0x4, 0x2, [@generic={0x60, 0xc, "9762347f889efb8c49e0a9dc273cf13c5c3f8d89fffe6b32de07fe7da0f61770f6f3f34255a2aebb34d7e4fbd5791f9c4994280be0fa92a031a7d10ede97595f95752bc519f1b6d19d137dbd5b27466643d90a2694463d6941a664a4032f"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0xff, 0x200}]}}, {{0x9, 0x5, 0x0, 0x0, 0x3ff, 0x7f, 0x4e, 0x8}}, {{0x9, 0x5, 0x3, 0x4, 0x8, 0x4, 0x1, 0x66, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x8a, 0x6}]}}, {{0x9, 0x5, 0xf, 0x0, 0x40, 0x77, 0x87, 0xfd, [@generic={0x55, 0x9, "9ae6b2480e98fdc5c56c99796e907b6fec6e2ed731e7db5dce3354b7fd1fe0101d8592db4856265ae9ce5282ef929520f5801d5d66f86e6712493396897620b176119086b915f4f8ca74f95c0a04c3f8d0ff5f"}]}}, {{0x9, 0x5, 0xb, 0x0, 0x200, 0x7, 0x3, 0x3f}}, {{0x9, 0x5, 0xf, 0x2, 0x400, 0x0, 0x8, 0x4}}, {{0x9, 0x5, 0x7, 0xc, 0x39f, 0x0, 0x9, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xb2, 0x3ff}]}}, {{0x9, 0x5, 0xe, 0x3, 0x200, 0xff, 0x8, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x3a, 0x1}]}}, {{0x9, 0x5, 0xc, 0x0, 0x20, 0xfb, 0xe4, 0xfd, [@generic={0x43, 0x23, "76ec6a8252a6f0aba7051a63ef4e15040cae0b31a235fd26ebd9e0462063fe180e02246ab6613a01bee325fccc65132221130bb6c0c25413963a945bde572dfde5"}]}}, {{0x9, 0x5, 0x3, 0x10, 0x8, 0x4, 0xf0, 0x6, [@generic={0x101, 0x2, "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"}]}}, {{0x9, 0x5, 0xd, 0x0, 0x10, 0x0, 0x80, 0x3f}}, {{0x9, 0x5, 0x3, 0x3, 0x10, 0x4, 0x5, 0xfa, [@generic={0xda, 0x28, "95c9b11d9e759cdd5610e6e3c19e52563f8918e250e4152af20e57aadf3a25965749137992829efd5cad0b86aaf61ac99d5516f36a96bd7db1982249361abf367da498969e9787a70c4966cbd971645e60f699ffc7042c76e176aef55c6314881009ace7c8584fc6b58ff614cfac5a15371f18b47f44e41ea76d85e3dcf328391cdb0a1b291f23990762308bd656827879841f207f2772fed268d8582eacc05b7f33010d6055b02f898cfadaaed9eb96bb3f681f25498953d6f98d55d74232a1c7be6282755284dbf3e70fdfbf9a1579cc01c40e11453547"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x40}]}}]}}]}}]}}, &(0x7f00000016c0)={0xa, &(0x7f0000001340)={0xa, 0x6, 0x250, 0x0, 0x9, 0x5, 0x20, 0x1}, 0x19, &(0x7f0000001380)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x5, "d82c2921c2a8a6a9af5b786348edd28f"}]}, 0x4, [{0x4, &(0x7f00000013c0)=@lang_id={0x4, 0x3, 0x423}}, {0x8c, &(0x7f0000001400)=@string={0x8c, 0x3, "2b6fdc32d8244c85cf21ce4a629ec0bd5257b159ec12d89e7e222ad4bcfa9bc779579f75aa532a17c0fb16d1c0587b2fb89ee0a977eb523d20c19c85e045313dee6ebe8d366d6fc178401434a07c233bb02eea76642454a4cae703358fdb9011f265809fbbfd7e5483b6b6797342ecff7e2b8684a5ccd35da7a776ba7c858b32dcca46701c971c9eca59"}}, {0xf0, &(0x7f00000014c0)=@string={0xf0, 0x3, "9062ffc5f9fa5ed2d55f6a5b6cc488133e56137fc179516c09649cb3fe1ac153c82cc8d36c579e5d64d342ea93b6e46c9cac6bf8120ba7def1284152327c50b8ef147f8b3c71bedd8dfef48c22382840a8473973ca54fef4a2f46c78a12860d2162cd903ddf2e490eadb1911f8c4eddad667b17063554809b742b405b18d0cf56f912b50f7143b97dab02fcd32ba8e8ff517682646239d2f77131b0080e5a2dd5c66cbaddefec3367bfbd62609df17025b69dd3538f28b64e4bfbebef932ebccdc3309385be24d60d95835bdc6ccc2c65a566f65671bfdbaf23c518e107ef5a76a8356c3e09554fc4658af2d98f0"}}, {0xea, &(0x7f00000015c0)=@string={0xea, 0x3, "b4978d51b39cb5f66d2b4973995bdf36e07d90344b9ce3ae78a42b8489dd838b39e1d40479fbf4830462cff514e995d88cf8469872ec30d79b8566f21a8275ed2352a058acbdb98472731fb0bf1b769701b45173c6033ab195282b09a59031472153fbd34053e083d07f094807ff425db340cc180d05e729b30f7dfe8f0f8fe6024563730416cca97c300ba17f6dcba6ae4ed374d361b6ce49f13de1f4ed96ff87a2635c63bca58c8e13dab29a30e2005c15428e6079c290d06c1941f8b21a8ba2860a28e4f823a280d564587b4a483b6c1fe690ba933029b5b4afab89f74b0f3b11802fd22ffb26"}}]}) syz_usb_control_io$cdc_ncm(r1, &(0x7f0000001800)={0xc, &(0x7f0000001700)={0x0, 0xf, 0xb9, {0xb9, 0x8, "0a19bd20c122cc6e34c06cbd426f81eef06b51efe7433c2b82df8ed45d527c4e717ab088ca9ec316eafff5c3ddf8e318204ec03a0b6d019e0529a943e3f8b8933e5f06074f157748f6c5ecf5a3e7500ec853f298adfb71c91f74b55465303eeef9abe39be5bc081e4b6e12905d376f95cf2c9a0890f6411bb1cda9a0be3bf094081d865d13c21e2c91392271a29a28ced1d1c7bbd762535ae3c0d7d859b63c3315783e2bd8c4b8b9f5b165fba30901c541f5d0086d223c"}}, &(0x7f00000017c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001a40)={0x24, &(0x7f0000001840)={0x40, 0xf, 0x15, "56cbb014373054e53b32f8ccec58258b1d68956a9b"}, &(0x7f0000001880)={0x0, 0xa, 0x1, 0x5}, &(0x7f00000018c0)={0x0, 0x8, 0x1, 0xa3}, &(0x7f0000001900)={0x20, 0x80, 0x1c, {0x400, 0x7fff, 0x6, 0x4, 0x7, 0x7, 0x8, 0x80000000, 0x100, 0x2965, 0x1, 0x9}}, &(0x7f0000001940)={0x20, 0x85, 0x4, 0x4}, &(0x7f0000001980)={0x20, 0x83, 0x2}, &(0x7f00000019c0)={0x20, 0x87, 0x2, 0xc}, &(0x7f0000001a00)={0x20, 0x89, 0x2}}) syz_usb_control_io$hid(r0, &(0x7f00000003c0)={0x14, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x22, 0x1, {[@local=@item_012={0x0, 0x2, 0x1}]}}, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000b00)={0x14, &(0x7f0000000940)={0x0, 0xb, 0xbd, {0xbd, 0xbf6390f35bb8588a, "c391eaa8ff37d6f578ce2b40e729e6e2a5b33e708c8398729ce534164dcedd27dbb4e4d6b306849e763598b0a2ba9753771fd6d185db0567dab9cf71a2edaedb60aa108b276b2d5c7ecf72c7f7e2f260948a4f454fdedb6e284bdf832ee6392390addc5391dd442e6e77985c2f207f5febdc016bc50eedccb59157565d5cb718ad69736bcc6995a5feddf58a51b47df49fcdb5061c45b391ed6c3dd005b1a9f2eb1af7f3835ceb735f10ebf537776c192a61884ab7ddc7a05424cc"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @string={0x4, 0x3, "721a"}}, &(0x7f0000000a80)={0x0, 0x22, 0x1a, {[@local=@item_012={0x1, 0x2, 0x1, "ea"}, @local=@item_012={0x2, 0x2, 0x7, 'nr'}, @main=@item_012={0x2, 0x0, 0xb, "844a"}, @local=@item_4={0x3, 0x2, 0x0, "de63a398"}, @local=@item_012={0x0, 0x2, 0xa}, @main=@item_012={0x1, 0x0, 0xb, '('}, @main=@item_4={0x3, 0x0, 0xa, "f9e64d54"}, @main=@item_4={0x3, 0x0, 0x9, "3c1d2585"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x8, 0x1, {0x22, 0x272}}}}, &(0x7f0000000d00)={0x18, &(0x7f0000000b40)={0x20, 0x15, 0x12, "8fca9c64351a6c307570f793df98e5e23096"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x81}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x3f}, &(0x7f0000000c00)={0x20, 0x1, 0xb3, "ac86ba5aaa7a592fccdcb9a92d4f53d511ba168838645f746e5d9e6c8779966bfb4077e34945552232d5da5c9586d8af8c02df70753f420c0fecd071aa9ed5894021814f87c7ac2560470f378da39cc8f2603371e44b6bf21f46afd299b4347d2ac6ccbb72ad83273f3ef7de903578127824d28a9007a0deb036804e66facea833a479d8a78ecc9766b0d89750fe7b111cf2d696cd9b13c33e5ed3a20a4345e8b5c3ab9c535ae030827b2f5f797a308bc77537"}, &(0x7f0000000cc0)={0x20, 0x3, 0x1, 0x20}}) 09:38:18 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5421, &(0x7f0000000380)=@usbdevfs_connect) 09:38:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000880)) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000840)={0x145, 0x80f, &(0x7f0000000440)}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0xf801, 0x4, 0x3d0, 0x10c, 0x1ec, 0x0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0x104}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x41c) 09:38:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) 09:38:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfe, "8000"}) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbff7, 0x0, "078cf0251c0e00"}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000380)) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000040)) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0x1, 0x3, 0x9, 0x3, "319bafa3c1fd483b6f7aa2ccbc5ec4e57e61e8"}) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0x8000007, 0x0, 0x0, 0x0, 0x0, "2959f5f20fb8000000000f10e7ffffe10300"}) [ 281.982434][ T18] usb 2-1: new high-speed USB device number 9 using dummy_hcd 09:38:19 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5450, &(0x7f0000000380)=@usbdevfs_connect) 09:38:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) [ 282.239438][ T18] usb 2-1: Using ep0 maxpacket: 32 [ 282.357777][ T18] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 282.548176][ T18] usb 2-1: New USB device found, idVendor=12d1, idProduct=3ff2, bcdDevice=62.f5 [ 282.557656][ T18] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 282.565802][ T18] usb 2-1: Product: syz [ 282.570255][ T18] usb 2-1: Manufacturer: syz [ 282.577389][ T18] usb 2-1: SerialNumber: syz 09:38:20 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000200)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000080)="22d29306c0ac999e", 0x8) gettid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) sendmsg$nl_route(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001300010000000000000000000000000054e1113b865c9159c439abb0f43306edd69b7322e7e74afb4540b0e6f996480114e97ec9ac66424bbe8512bc7f7530320beef823e8036468a3f0b82e3f8b8c0cc27bb199e6bbdd922940e13938511de8be679897b67e90a257cdf6b69af03c6c2802fdf8dc1379d4632349ba25cd6865954b1f6cf4b95abbd2bad265ce193201e4cd", @ANYRES32=0x0, @ANYBLOB="00000000000000001400030076657468305f746f5f6873720000000014001680100001800c0009000000000000000000"], 0x48}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0185648, &(0x7f0000000180)={0xf000000, 0xffffffff, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x990af6, 0xfffffffe, [], @p_u16=&(0x7f0000000100)=0x5}}) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000000c0)=0x7, 0x4) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect(r4, &(0x7f0000000340)=@rc={0x1f, @fixed={[], 0x10}, 0x3}, 0xfea4) shutdown(r4, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r7}, 0x8) dup3(r5, r4, 0x80000) [ 282.801884][ T18] usb 2-1: config 0 descriptor?? 09:38:20 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5451, &(0x7f0000000380)=@usbdevfs_connect) [ 282.872485][ T18] qmi_wwan: probe of 2-1:0.0 failed with error -22 09:38:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) [ 283.072188][T10172] udc-core: couldn't find an available UDC or it's busy [ 283.079540][T10172] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 283.123681][T10199] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 283.179165][T10172] udc-core: couldn't find an available UDC or it's busy [ 283.186340][T10172] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 283.214118][T10199] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 283.287604][T10172] udc-core: couldn't find an available UDC or it's busy [ 283.296330][T10172] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 283.381392][ T4694] usb 2-1: USB disconnect, device number 9 09:38:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r1, r1}, &(0x7f0000000300)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f00000000c0)={'xxhash64-generic\x00'}}) 09:38:20 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5452, &(0x7f0000000380)=@usbdevfs_connect) 09:38:21 executing program 1: ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, &(0x7f0000000200)=0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41600}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x2, 0x6, 0x301, 0x0, 0x0, {0xc, 0x0, 0x4}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x73579ebb315b6bb8}, 0x2000c095) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x38, 0x3, 0x8, 0x703, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}]}, 0x38}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x10001, 0x40260) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x2, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x400}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000044}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) sendmsg$nl_route(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00', r1) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000700)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000400)={0x2ac, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xe3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x401}]}, @TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5f6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7, @private2={0xfc, 0x2, [], 0x1}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1de4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg1\x00'}}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x42}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffbff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x77e08277}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9d9b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8bfb}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9e4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x42b6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaa}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xb9}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfca}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}]}, 0x2ac}}, 0x800) 09:38:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:21 executing program 3: syz_mount_image$hpfs(&(0x7f0000000080)='hpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x1048005, &(0x7f00000001c0)=ANY=[@ANYBLOB="00957baa8fe7388a3a8b9da631d30e2d123ba7fff58ddf82174e845b600c783a3a5ea224b340e2549b48cf3ea949ec767242106560c9138e9973609077053013017bdde4be5dd88a1d938cdcb5b44d4f8507e7e866e7acb2a85051e4ee5b51df2bb228bf8323135ae6444766cc7598233b1dc73292571847d22ac9336959ea02698a8c36f9d795d3bf920e9790c87f327dc44819ca165845cc0e64e27b41cda92ae3175f60475a2cec05419c083ce750c936fe7c5ba54db2a019fc8d6ca39f81"]) 09:38:21 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5460, &(0x7f0000000380)=@usbdevfs_connect) 09:38:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:22 executing program 4: write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000000)={0x57, 0x6f, 0x1, {0x6, [{0x8, 0x2, 0x2}, {0x10, 0x0, 0x2}, {0x20, 0x3, 0x2}, {0x80, 0x1, 0x5}, {0x18, 0x1, 0x5}, {0x2, 0x3, 0x2}]}}, 0x57) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0xf, 0x7, 0x2, {{0x2, '!+'}, 0x10000}}, 0xf) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0xfe, 0x6e, 0x9, 0x5, 0x2, 0x6, 0x8001, 0x2f1, 0x40, 0xfc, 0x0, 0x97c, 0x38, 0x2, 0x1, 0xff00, 0x9}, [{0x1, 0xe, 0x2, 0x10001, 0x4, 0x9901, 0x100000001}, {0x2, 0x101, 0x100000001, 0x3, 0xffffffffffffffff, 0x3fd, 0xfff, 0x100000000000}], "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", [[], [], [], [], [], []]}, 0x7ad) write(r0, &(0x7f0000000880)="cdecbe85290fdefa9926c1c22fcfb72e26410c86cccfed0a0efd7f98809516b5e580280d62b22c724686b2ecebdfdf62293183878a5f4178294ceb601ad59c0f860e2df0a77204eae44e61dee99b2fc1949fa44e8c6bfac9045d000558f2e2c62ec2bc27a8431742ef7422bc9a3d3c16d09f4837d48d43b2a7e6cf637f58fb1317a0db9755f908a3c3448c2b7bba3690166f191c81a4ac", 0x97) r1 = accept4$ax25(r0, 0x0, &(0x7f0000000940), 0x800) r2 = syz_mount_image$squashfs(&(0x7f0000000980)='squashfs\x00', 0xfffffffffffffffe, 0x3, 0x6, &(0x7f0000001d80)=[{&(0x7f00000009c0)="2c477da2c92bc1a7542f3b2c570dba463725aa418be67cafd6d0827d7007b60ef25c7d8bd43f79a39ac03f708ce053a540a90d85b1a0c153c300070abe709f3ef86e8eafa80aa09b8c7e", 0x4a, 0xb4c}, {&(0x7f0000000a40)="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", 0x1000, 0x7ff}, {&(0x7f0000001a40)="750cefbd296bf74a0412001b7637622efe49f45e87e917e314d01a5ff9f358841e058387a0aba9dad31b648bc4b365291e484028e0c242bcb497adad7a0a21e9b70d6c7fb3eb0ffdd9c8d3d7c885755b7768b513453c765a143ac20710496ca7d264b2a864ae66b11958d96bf9869b205c638eb999639b92f90ced9dd0c6a0f3712b0a70e179aaae7bafbc266671313f2edc74c5089836ce8bf2a74415680920cfc034648ef469219116db633db5b0d300f1d5addbaed5e916c7503b97dc5a4295311d02908d806eb47a2fb27e611e9468f5216f3dba94ad4576f07b9f1548b7ba2b555235ce476e63b356e6", 0xec, 0x2}, {&(0x7f0000001b40)="1dc7fea06b9517ad6ee26edaad159c4a2a3b171d1ff89957b63ac0b8dcedc7fdc528a711396d5cef56e3b456567a64280397561c8ff483e229cf32150bad500b3d52aeaf", 0x44, 0x6}, {&(0x7f0000001bc0)="2aeb88851373869d250348db99305b4c4277ae2d02a3199a9c575fe0ea314355bf5edeef0e4f51854c49f650efbbb4f879cf825d8531c9e958ba7290d92e9fa307ffc6b711a08cf5ed29abea2fd470322c037bdfee19706e022041e0163255854868a02102c34124a4017fb729acdafa7ae87f257beca2279452a0be3b75dd487d1749afcef9f80049d5416e06a3107a6248dd8e09b5", 0x96, 0x1f}, {&(0x7f0000001c80)="0fd3cc4cc264006fe3d309b744941658b73dffabc3db6ced6021da089c84bbbe6ad9a6350be1e7e1f8327388d24cb006b5ac461d862741e71b123435e6bfe1e7922097f6b0606cfeb21f04a8864c519b6811fc987e46317e4495f64bce92c031c474e5e838240fa156c8464de86fdc401d0a0c9da854c82efbfa8a51f6124a6a6639b7839deb2b0f10e5a06a60fc6169a683bea7d24d96386869601910afe8ae0c7c97d506e425dc72c32bd5d61c9de105cc264706e0f262ceb1a2c15997aadf921ce410e85ea204806bdbe915b7dfb8cbe1c0d1563548ffb87fb83b41bf3af546a14d4c31cde09a09d8aeaa792934fb7969da7bd76867", 0xf7, 0xffffff85}], 0x800000, &(0x7f0000001e00)={[{}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@context={'context', 0x3d, 'system_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x0, 0x63, 0x43e6e5dfbe60c02a, 0x31, 0x66, 0x65, 0x38], 0x2d, [0x0, 0x0, 0x33, 0x31], 0x2d, [0x38, 0x65, 0x38, 0x65], 0x2d, [0x61, 0x36, 0x37, 0x35], 0x2d, [0x34, 0x63, 0x64, 0x64, 0x62, 0x38, 0x30, 0x34]}}}, {@uid_gt={'uid>', 0xee00}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) r3 = openat$6lowpan_control(0xffffff9c, &(0x7f0000001ec0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) close_range(r2, r3, 0x0) pipe2$9p(&(0x7f00000041c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r5 = openat$vicodec0(0xffffff9c, &(0x7f0000004200)='/dev/video36\x00', 0x2, 0x0) r6 = io_uring_setup(0x26c0, &(0x7f0000004240)={0x0, 0x9d2e, 0x10, 0x0, 0x3e2, 0x0, r0}) r7 = syz_mount_image$exfat(&(0x7f00000042c0)='exfat\x00', &(0x7f0000004300)='./file0\x00', 0x101, 0x4, &(0x7f00000045c0)=[{&(0x7f0000004340)="6b942453bf883d06a7da144642833c1f2fde01cb70f5b4895d13bd52ebc0f2f1e832ef05a5581a41b91b", 0x2a, 0x3}, {&(0x7f0000004380)="e3e2eac4b67adc2457d3423b0351a58c979cf55176551aa7df8c985fbcd64bb8d3a8935eb28654968d52ece3609fe0971ba133d5ff2416d07ef1bbd8bab95f2eca38095ccc188c660dbb02036c56786629bfb5ae6265a0f976d5d2459764361f3df0bfee4e8b32dceeee25f01ee4cb0386a0aeabd68a59eb6a8f0331c7d1fe840218d2b75f7ef9346afec6e0d7d1e5a9361d3ad5ea934e87d36b547fa640fe09c1a62693300932cf5ba95cc23f4ea04dca82357c74fa3f22807b", 0xba, 0xefc}, {&(0x7f0000004440)="2b2d24a31fcb857939e49ff0222f7059055c6520f86ae3e09245cc3b9d2b321780dbe22d74b0b133240a5e9eefe6954c9ef11b9c964f38aa1215eaa204428b93a4180d9aea3c467a2a9740bd31e1dba73727c6d09c4548b215dfcd026d50c8cfe5498f029cbff4067f02b8c2bac17a9e775381aec29d728089f90482a3f00ad6ef36dde15aabf2daf0946b9fd0b6da4c7170e8322ccc2cd711fdc49887cf9f68d4e3dfbfe1a525a7cea3c98da5", 0xad}, {&(0x7f0000004500)="71df7ef3c9815984e0b46dd18092542cce5cabc6241af524b773b060da54faec9dbaaffbbbc35f5797b5c72a77fb57c9005127915e74799c90f2024ec7cd735587a74fbfe136e2faf594b25b269f3da8c7f6919b1c169f7330ed7d7957dd60183fe6cd606a1e159323174c517c38f91a87c85e505fe789abf32482ce615aab6ad77c1abc0a06d232ed606ff28c27a0a310195157972097", 0x97, 0x4}], 0x80000, &(0x7f0000004600)={[{@dmask={'dmask', 0x3d, 0x401}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@gid={'gid'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x31, 0x34, 0x62, 0x38, 0x30, 0x36], 0x2d, [0x62, 0x65, 0x65, 0x39], 0x2d, [0x31, 0x63, 0x64, 0x31], 0x2d, [0x33, 0x36, 0x37, 0x35], 0x2d, [0x63, 0x38, 0x38, 0x32, 0x36, 0x30, 0x66, 0x36]}}}]}) r8 = syz_mount_image$squashfs(&(0x7f0000004680)='squashfs\x00', &(0x7f00000046c0)='./file0\x00', 0x7ff, 0x2, &(0x7f0000004840)=[{&(0x7f0000004700)="9aa18c03a4dcf75112ca1606c7a4314fc74cb05dec37e5cbc0cd", 0x1a, 0x6}, {&(0x7f0000004740)="4b5219b8b3d894290714333f590aaa549db522dde3eccb4a201f3a4559a3c48e5a1c3eded5a7817d207d2a7cffc27748f57e88655dceb652fa45edbc7786707be88e59d8912cef1a661ac9162582a03e217d59d2d0616e9d47e4a3bf9c485d1de679fd3b397afecbda35ed38000a1f9580305d62b2b98d1e32854e201d0ef5b9f7abfd4d075f4cf2287e408184e436dc165eb0d7fe305179a2de5cdd4cd7972dbc6430ea79a2d278bd7e106524f9eb231976370d42ee6199e7d4d476cf1a16cbb158b5b5390d6fd8d673c4796662bf2339e0b899579a8d921a40c1a161effd311a1d0775c01b3aac5904e3914c72633f51", 0xf1}], 0x40014, &(0x7f0000004880)={[{'mask'}, {'/sys/kernel/debug/bluetooth/6lowpan_control\x00'}, {'squashfs\x00'}, {'/'}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@audit='audit'}]}) r9 = syz_mount_image$omfs(&(0x7f0000004900)='omfs\x00', &(0x7f0000004940)='./file0\x00', 0x7, 0x1, &(0x7f00000049c0)=[{&(0x7f0000004980)="be479ab835b30799bd074a8be71dd80a6c0ccbdae196c8d0d9c3a33e1b5f101b6e0c11273aebd85af1e23485202c55d32b81ec4b5ff801", 0x37, 0xffff}], 0x40, &(0x7f0000004a00)={[{}, {'](+/(-'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@permit_directio='permit_directio'}, {@uid_gt={'uid>', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%,#.'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, 'uid'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, 'system_u'}}, {@subj_type={'subj_type', 0x3d, '#-^.)^'}}]}) r10 = fcntl$getown(r3, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004ac0)={0x0, 0x0, 0x0}, &(0x7f0000004b00)=0xc) r12 = syz_open_dev$vcsn(&(0x7f0000004b40)='/dev/vcs#\x00', 0x8, 0x200002) r13 = syz_open_dev$amidi(&(0x7f0000004b80)='/dev/amidi#\x00', 0x5, 0x800) sendmmsg$unix(r0, &(0x7f000000f2c0)=[{&(0x7f0000001f00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004180)=[{&(0x7f0000001f80)="ba122f4a03340cf054ab5b7a669088d2f97d5a8af2f72109ca12128b783ca0d8cbbcd346fb347729bfafdfa587ce4b0175082bfd73326f1624aad26397c9f2c34a3f83a8c9d803792f928d77f45c4abd3e2d11027d0997b3e9b362016f5a31d8643d893fed18d691ef23aa83c9903da83117250b63a4f94a57323bcbca92f6a921712c59dc0bee86878a6504b1bcde8b23b7427d1e5defa8d5cf82ef952bb02bda37da81904d16d1724bf1188f81fa9c17a90fae5aa4a3e2ca8f035bbedc22a0ba952f5d72d54d5eb096fd1437e43fb54b30a9ab5d08f761e7a6d029bbabf27f50d9e38a94de2bba39d7e0ee61c6f225f3d849aa52", 0xf5}, {&(0x7f0000002080)="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", 0x1000}, {&(0x7f0000003080)="3c9940c32e75929ed7afcbac631af2465eb77cb04386298b06b47ba3357369a4977f943371bf483c7c7ff3d0c2230df8d48a05458cbe4bda1b00c1f91ed6fa4a62751375c5f8c0f70632c2678885b57e38e4a527691ff2a2eea78ce80949769116761e64b268a5078896bcd6d7d79ec4946ec9b58d019b96a0cf89a450c5962d52a40e75b857cf2e80453acc073fdd4288cb5ea641e969a0d3c5248ab71f272a7521a54b7861a7a85faf6a5cda44193d5990c9902b788f7310a4f7f58f24929830c483df96d3b9c18bab09219395fdade97c2fd595ae010e06d1a081f94799225dddb0f25e7920e573df786e126f8a41ec7f6d614a7f8aab4826a54d10b17aec40daefc90790abc5538fe1ebd2e4baa2f5b6c7acdfc2e2e507e2b7e0401689a1f6d414a47e8d3a93cd8b88dc22c6016c8cbfea39fa565cf18cc85226f4f8cddd9f93b90283bf551cb37a48871e8a0d6174a668a20614da781607957be00b5b6c3dd455da4c64f81b22564f2083e473987cc5181d87ce18d9598ee983cb62abf2e79970c1f768f2eae2d97a56dbda9dbf7d5da94dfb8ad635bff78e07184d4e39bfe170b657cfd184e60df996b7232720bf85e25e279b9a3917334f970f1fffa9cddb6963abf89d09f08e953eb165cedbba9932d349f6e14c71137d4f207ed595b81c8bad9be176f5c32c52fad0249a00f72d5514c04087d204906246e44fe1a125b1ece2fbddf422562598b9fc9c7a5da3fe2c40902fe7de008d5d8c473b1206511cc2ef3eadb230e73693f49d7244db7644340ae06ab4ee92987e8a6897f9bbe680ca707550812cb750bbfdb1a534332abd1f4945837f6058cf0a0a7353fc4afbb56a971899b2b227e1b4f896d252b923ba85986075f0fed09df98593ed890a1811f889dcd00a95594d5eaca6d85a807deddefc8043430deaa3d3982dd524003491d26e46bc82dd68815e168ccdcb861e6509dad54a72c02b72f502e02db53e96ddea95c7cda322cfd30a266faee393189691f665478e3dd87a32e50448932080c90eea2a18256191abe0858ffec15d6117c3cc9704814abbe7b70a19f84e0f229c79cd7568e9e7816fed3d8bfd8c3a32ee42185b8b5005c74d1b28dd8f34ab2127ddc3134af1738909aff02244e9fb8381f1589d40bcb80288b88d3c3695a2b927379283015027cd0a0790f9f3d9e53a53e114f000fbca535c9eccae2b91740d198727d9f149d3f03abbddef2ef6f101c3614959fb7fba94dfc2f50f1f74488e385e03269b09bd8a597a1c4b955915ca024af3e039c1975dab7353a573b5fa1336ef62bcd55ff688322bf1233b3799a69d33d982213598e5fdfd3f22e83a095b7440553ecd6694167a9379e653c63103aefa7163e0a6fcb1b956d5881ba0cb2c8958895f5732701753d10dbfa107107d29160a74014ee55820b3f8d2dd38803fd2cd1a9b68896857b47e6e2d41180d9504fba16910a1001ad006fc5c8aa75a169b52ee10f89441935c8ccc8dab6bef4553fa27baf49662860759cf6ef7daa1170e2f8d3a14357fe5548388b1d7378cd00f3bf8d30bd354b83050ebe0db94fe972736ddf1e52352efeb169b68298935723a591756c0d04a604ec702180134480ec3b2a0f70b2c67f128d45f6853fbeb8dc2423f6eda899b5508e4e3b3455140959473c043616678e819a924f8d9a6dfb7338034e63c36b8c6923d9f451f85324e10344c7335d35c7999f5931274a15dc3e00ca1ca2ecc363110ff26676f5ede42fb38d7426e75ff4a1065fcade39b1eb80b85d8cca2641c14eaebfee3e4a13ba150985dc6f7deb666b73640c69e6456e648aca3640e28b4db4db65e9be27faeeb7f9ac26e0c3271d424f776aa401dc0f1a791b7359e356dbbc641901421ccebb8543e2440df56280d668ce9ce2f553bb9dadbc691bb5ef0679c5f9d81ffe7592949dcb160bdf254c3a56ddbe96d16c6edda3f916842eaea9f0a14f32a9dd4aa5c50fd6d62483359540f3ee94701fcb7c9ff1b50e0b3c42eefa9b51196fdf6b512c555c540be0257a55c99ded68d2b8c9377a963c13f2cb9d586e557508a4eb4f93e5a59262f0f27f3816f2ccd3c1186f5b05a8e47f2f0673c3c8e04b286bd2f9621e4333cd3eb5690ac2c4abcc08529e08def19100306d2abbd630b7062deae55a76d42ae2c98ec4f3fdc0e3a1b7e48d9d52a1b7efb8fc3b363f6582800a7bfca269eeb70caa23f2f6ec79db26214835de5f1fea21408e32b2af980914b0b49494930f00f670f4cc08cd401321c314915cf5fb2268ec5ae48c15f5fc606b0940d87f5762e1a24b6a4e50b8cde990d7c5e24ea45c102bd0d25caa2ca6691c72c613fc84f89fc837e472cd7a19f958c1afe5777b762f8abba61addfade021a314c6f88c55641633a983733266e8cd89c6c44ebd29d11312bb88f64879b96b8bc2b3ca549b48e4911ca5eb214e81d9c0c1ee5256b11af6797075ba83872e02841f4aa851519a7359e18f109cf658ae714bf2d861520dc66f415e748fe0900d011bbd534e327b767ceeec54e25ce5174196e1d5db537ee5e45e7e8dde212ec04dcd590d229d505158095da9f708cdc95e6ba0d7c7681a3c01d44f2e952e0d1040577e96bc336d181453f49027a6632d69c355cf22fd9373842337ab8bb8e5d457d399ae2c25aa04452b657e0125fd2b5d96ddba2a598457cfff045b44a76f5e48f8fcf9e75852f47492311c404c0b8352b9d4f3f7feeebf693e4588bcecc26b81446e3c7cb797b820b920ee97addd355c5defa1be1e11c3079a46e210b366cf26b210a1ff1ee6c468d661f6d232e6cf31789cf35bbddd33cf3126b9df4ceb56841d11ebc0b8fa4d50ce7fb4a3ca892bb94e1f66f832045ea1498a442132f34e638410489ea110101d159ef752656dbb9a959366b60f72a72f5174d2ac32e733cb3ad53c2e02838e0cd7e0eebaac5d4047437db39c698f41b89545ebadaa8e8bf9f48d840a043c059392807c7951ee933a20e56eafcd3773ebc010579c970842dbbf6ac312d1292b60d46313bac5d3641c30a9c3c9aa2139c7f98f5cd72926a5eb27bd7ba59a242796fe6dcbf9f60983e1a5ddedf7896d5bd79fbc2a9cd29716cd9c0204e40765fd0c2aca1989ef08f4b49713cdefa2455c67687a7f4d5db48dca6ae4e418ed39357aac7f526fef4c734c85d6fbe7c121a4d18ea103c038c4aefc93b86542e5b960b2165dfe5a7ee27870827488a223b1a507b27b5f6184eb2d3f7f46acbc5d48370825bcbcab0aff7d1528d2cd716fb523cba60be7710cd0f97d4d5fe802fff404c3d53d96202e0ba7f4b98d2bed48f9fdfe81926376e8aee26092ecce0537dde82248a5e1e2065800d6eccdeed618caab47f2060f5d0a5ff0aef77433a12a44b361d715f3b481ae4ad8bd94461790b60e8adf614135e9862131753ecb611afc7a4224a28664a4f285108bff85e4bfd726fbe62d03f9060749db603c9a2165a182aecc30e4d100ff01da226c2501777aea2143d556d16fc360c84e4540f399a68a87cde77ba54a891124a7240e3d9d4409357e07c4f9de4d946b487ebd5339b5953602aae24fccbc1667d087b06331a4239ff79f1aeb1dea63bcdfbff03f3adbd15e28a0130d3eb9488a2e2105cbce204fd24f07cc7012da262f25c9d2eb58331dfa2c9cde1a57db02711a41baa5df33c335ea8e1ce30c848fc405a54ee4e7964acb7e36352e001367307ff8e4000a967f31ad8dc713d654bc84e6346b90e729e8c0e5e95975cbc5f985415e2b4313d27405d6a9c2259bb47a85adfac2499a1fc2e66acd1bed9329cd64af29db35f05bb40f88105030f32fec7a9d100a8920c56bb87b63a754e899416ac0ceeb6858d88c43bf23cc7cda42dbc045e67ef62ba3dbbe8457901ca4d4e09171120eea15d36e831729bea4ccf07439e222caa962c4db08a24a00ba03622f3a49367647c1948d35f32d47b5e7e289b26ad56bb7c92eb04d6a102809f3129ffbd0adaf928596433ad8a8ed70c1cc83b36e1339f204049afb52a176bbbc8526ac0620b0930dfd05ab9b305d17de06d896298083a05f40e5da93e9e99bc584f512388e4871968d9efc47dd98b9192d53e7772cb54149419ea4ed6a38d1135469e457b3a6db450af48ecccd5a6545c44347e42a612a38179649426dcaf03143a93313d9e70b42981d4478cd43049b758a5f507e2e1212d97efdb569f35689f306d8478ce72254cc0d5dbf8bc0b1b4d84839dff46f16ac0c3a6458b2d84d2b251b99558bfd0fac3a2dba20c58c79a2c50555d03c7329e7901593269d8d63975100003868068a8088bfc235a54307c14d3d8f76e458dbe944425965d7fe48b4e9bdac1e8fd6e332b350f423c0e298cd54daee4010a04839101e1022544d38fad2f12bd87c50d6370e391903169a550951f16f2ac474ea48a23307567e7f29d3f46da81ddae3b44482e0dc79aed406862941d4d229cd824d68ebc69c5aead77362b782097cf783629914edacbada4bac3a838fad299fff0f6205212aaae7b24148365e889fcf405efc4d80d75f50d775c007afd862becfa28c649b7aaefb431803a60958357e38a8920a2b8a7d7dcaab4578ec0db31cce4b3c8df34618008c77ad5d89970a3883e92111110d1bd77302a5aac99318d5972e6e2197883cb320a3702ab47fac7264849b9f9da476ce809383cc9e1043f2274feb403b25ddfa2ca003b7fe5e624db1b47687017d3153d98b90aa02929d8502860d72d44bb3dc866cade54c014ffbb61ba8943539e1f819286e0bd44ea226b39a1316dc6303d09db7388c3ba6a00c367ed6d727359e33670c5ca7d77d8891ace3f5d04beda2b7c7192524128181bc531890a2c46f89cbaba3f7152695426ffc87fc94668e237697d1d2e68aaf5ebdadfc140ea05188c2c5b819de60de0c3f2e8143d6e169c0fb165c6ad3403d20d3545c4088ab78126815716beb1d360d76c87a4736f895c34f911e1529cfa0b38e61d940ca59c0a17e4650baf542b4f835709b7f6a537ed80b08b7acd8bea27b2317304bb39965cc404f952dd07b32aebf843d0299550797cd57749a5c142af86546f35d49ffc6e68fae05e83c96f3ce79fabdeedae0b3557f7efea629ff8e8fac323db3c79299d82d7f4c7203b6897578e246313bbad3c745906b296f443c542da63b5ad54c82a70a92ebf5c80320ff7cf57ac12f3dfe34e7e751c909c667546cc35f33e9f30bcf3b851cf414652222caf56337a1c519bcc2c57e9522eea3e618a70ac116977c297880e9c242114e2448054f301c651fd1b195ba26c2fb3ac1c184b1621f508f3ec7813f9d3fa5690ba321bc4807250663e9db7829edf49a2e91d9618e35e3b36f0efbcba2a4d7f840b29dc4de62f504a754bf8e87187ee18339936de90042b2cfaf81c9be5bb120614bc5a494e72d48610f58523c3728b0b1e66716482d23d28461789cec8669c747c7b18381508f18c772065c6372d4a12c51621bce00e8fb8bc98123a870bc176327dba15e4b50ce4df8d1ef77268362fbd9fd7ee6cfe031a148d91438c880872e7c7d927c96fb297cd4ab96a2f426666db0306b01c2ac6e520d7277fbcc9b63ed57f2d0d10734a7e856a733024015b41ed8e69ef76cdba612d6eb348a697091c999b3bb219d799b4dc730b875fee9b25a5ac7dc275751045239bef262fe4084cc6ea57981ad0df24706e1a764afc027265ebbb15f0d76afd20f8dd28e4f82370a2a19d6f6f5c4062906dfcdb22c5435b6edafb2d37fb47ec66d0dd96de7f68a", 0x1000}, {&(0x7f0000004080)="d643ca6a02ade60ceb9dff99d2f4b5a8062d405f40b07781c43e596d36277961af4d40c3e62115808ec6bc261d56a8a0f24dda1031970dc3c052a526cdd69dede286217fc00793802efc6712383b7a572654f8b01c0f9c8dfec0f35931218016ff173bd677fef9bc73704cf378ed7470dadb7c5de1b92bd994d339e8f4df686d1f46e27602eed10b19a1fb5a2b101f94a69864a10cd468a31a36b8ca8a2d011e17dab140a2eba24214a4cfa5c5be70d40e906d1f21a6e0b2268179", 0xbb}, {&(0x7f0000004140)="50d4880b645685eb3a8a88fb296594f18fcdd86274b9dc2dcc22d5bbc9d2e3f11bc2f25324263371978d22f57cf2", 0x2e}], 0x5, &(0x7f0000004c40)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, r1, r4, r2, r5, r6, r0]}}, @rights={{0x28, 0x1, 0x1, [r2, r0, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3, r8]}}, @rights={{0x20, 0x1, 0x1, [r9, r3, r1, r2, r2]}}, @cred={{0x18, 0x1, 0x2, {r10, 0xee01}}}, @cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, r11}}}, @rights={{0x2c, 0x1, 0x1, [r2, r12, r3, r13, r3, r1, r1, r2]}}, @cred={{0x18}}], 0xfc, 0xd0}, {&(0x7f0000004d40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005080)=[{&(0x7f0000004dc0)="2e9c5afa8d88a0d3ec36f0e69d6936b6ad17cbe11534d941e639914d7c490eb6d1d321a63c6461374af96f6080999d29ca887704d7aee5a0489ca1340dd9756d000cb3558d6491c86a0237a48361afb625ed76f91294409b1efe7c812bbf1bc1ac65d2fd8a2d5cd4ba094965c5ba9c1eaed9555078cd39c3d7881820173dd03b8bda4a5d42fdf4d49ad32028a93d7fd4cfbbc512fd6b80437172609f", 0x9c}, {&(0x7f0000004e80)="fe7ef80c1cce235f45a2406a753fd00c44edee00a7bf95fde3734763320b9e3067d58e708b7ba6bb5bf901256ba9a2c5755777c550564ddd432633525d36fc4116b40323b120da74d299c2f144454bb7c68dd119", 0x54}, {&(0x7f0000004f00)="70ca24f0cc6253619e5539e1bd08fee152098140c92bac26b44fa37927411865930cdfb810d27c65390f795155e7412550484ef761cb3954a3ff98065841d391378db93744ce5882ab4b8aff83cec0b738b7b86b133a48898ae64bfcd7c4ad6bd33f53f3d1ea883fcad8c5907d3a576bec2053da4dd6757c7625cc2c", 0x7c}, {&(0x7f0000004f80)="a1fafb714a287365a7a181d51669a617329bd928d21cf3caa909efb6e05e8e5a", 0x20}, {&(0x7f0000004fc0)="a88c9df4b92dde1f29abbf6499a1dd8173eb3ed3c848b5794ff79f039c8d7fb8b809d6d498bb9f89bcf18e36b4c70755111abcce8a89abfb4c0ed7815c36ca576edfbc0252969dacc49a5b1a06e8679aef8cd46ada5d0775a96b7087ee2c9dfca3b76733bf6ff8e426d4a2b10de7d2b0b896e130e66132493379ea008508c616cb6db779b372f965127168e478fd894fd6d9bbd07fd3fb90c5", 0x99}], 0x5, 0x0, 0x0, 0x20000001}, {&(0x7f00000050c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000005440)=[{&(0x7f0000005140)="7544da6f53bef678f09072936f31add259e428c91f833247f9edd35afa82d845f5e0aaa90c03d06b094c1b4055fcd2e375c9062acc3f1709fb6a36ecf3eb52a39cdf30215668e4040da0a5d2f9d93cfb7ff06c6992e30a62de22f42a31f86139c2016f9c8f34d94d6211410603ee8adfde293ad30b5ac437d5966c197f500a642b8e08663fd26a6c688aac5885872cd80d4f2b83f12f5c856eb6883faa4e723f3d0e2da703cbb4e6d3277c62460bcb45f71bc8ecce17c907d8a30565a74063bf", 0xc0}, {&(0x7f0000005200)="601b79e751ddd8c2be325641b0822936f1ccc0eaaf94e9361900d5641a81c25801ac5115c2e33ffbb2647d1ea7b1a87b5bdd97f0debdf1398c033b15721e91da10590929c831aae80fc9e15a1e78861757d48dce70c94577b3b9c079fccabab0611ec383cb4e512fa6eb3210927d39af032bb74e5a6b8d1adcf78db48b4f88034eb357266205d32fe357c62ba5976ecab8602041a9948adafc3ee6f990d6ccc6e1e50809d68ffcb815cb2cf4d283ea74d54330b6ae63cbb859389fc7b2b1fa1c057d14497b173425c6a3b8eab3f0c983c1931ef1941828ef45", 0xd9}, {&(0x7f0000005300)="9fc34c22f3cca7a8", 0x8}, {&(0x7f0000005340)="ba24cc29072a4814e3c662a255", 0xd}, {&(0x7f0000005380)="5d30294e61dc5fb3e9537679121515af25619b7198d29fd4f32bf6b825aceb38f2c8a799f1303c5793114fd336941b047025469dd208d2e9f51771a4363b9686f0099a362dd73d92d961bc0fe02457a7f2be94c952e0dfd50a8e83526f3c3a9a8e60", 0x62}, {&(0x7f0000005400)="31f83456962acf1d93f5c26bd8453a7f4a0f861b49af53d5a986e3393cfa6ef3ecab85b5a89ecf93828bf9af03e7e86b7d", 0x31}], 0x6, 0x0, 0x0, 0x40004}, {&(0x7f0000005480)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000005800)=[{&(0x7f0000005500)="4a2decb95375fe96e665185002c46257b397a372e9b32e9481d8149cc0", 0x1d}, {&(0x7f0000005540)="0d560b833c7cb725e945941e", 0xc}, {&(0x7f0000005580)="2019b1f55b879321ead92a7722fe34bdfae81e365e888f30b5b5d7d60a86ce7137eb1d2e63c92cb8b072fb3cf0b7821969601eb42e40069a87f5ad3ab0e8ac81c8a5b2a6d6c461a73b33fe61258e", 0x4e}, {&(0x7f0000005600)="784fd372ff7f67db8540ac58a44aa3431b73b9dc1017ff91f9e3258a0a6212e83715657b25f2067fa7798616b9c75c0c99fff7896ad1b83626076ba34c15fc59c1b74e03b35a2f252357147fb27d2bdb6baeaa55000c6787c89bc515b9e881969dba1816a49526e092408fad5174c485b23ffc5b890e15c4146252a24253f00b005f8cb5ff2701c8b2aa45c86277b1ba", 0x90}, {&(0x7f00000056c0)="e8830e255fb4aae9e49e54f40843e5a836ef236332bf39276f074d165b049b0a97d2c57f06d8416bf72418153278dfdc9bf2f55dd94bfa6c21b7890fba39cf18c6345556129bbee0ad9983868602181201e7b3a18df4a3b1ea54833a72a200e566df3b239f040af7b6c81cd2486c5d9c5ac68de469cf51eff63eb625de8adb5873354ba25ba72ce858d5b205c810457ae32524fac6f49c3895626cc04312857642dbd8dc59f621", 0xa7}, {&(0x7f0000005780)="68edbda80b97ca293fc5e42ddf2d178f8407c4005aa87e3f0bee4075f68da89ab7ee50210980b227ea027ff8", 0x2c}, {&(0x7f00000057c0)}], 0x7, &(0x7f0000006b00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r3, r3, 0xffffffffffffffff, r1, r0]}}], 0x24, 0x4044000}, {&(0x7f0000006b40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000006e00)=[{&(0x7f0000006bc0)="8af571cb54ac5252bd6a9b66ed70437d0bd336a5a0a09b188fc76129a57b33ea3936bf1693b0d96ea43cd47acc408afb419d2bcdc9e155c16cae084250ec833ec58a1d9b825058a3863b30c3bb5da9268c1af07ce1df8ba5fa7102a942d4d19c47a2e153d3f53a80aabec958b1bddbbdc97b52b60c6f8e5e98671ffb6056fcc40adb01e78eb8ebd9347133d2e1f9a0ba6c9445dff00f141e0dc889b9e5c457672939771e34c749a3e42d69cdf1a309c2ced4c8802ba10bbc2cf84a5420c914bea50feff8ca7b0de4e64b48f6aa0e1464006df07e5649b87d76", 0xd9}, {&(0x7f0000006cc0)="2fdf8fee5f31f5e9d546b5d0e3df1f8be2d0", 0x12}, {&(0x7f0000006d00)="13b882ccd3c7bcc73139e05dbb0237f71357921cbbf292545f2f1ef739472e45b1226c17a38f8d2dfbb03e8bc562d05943bcfcfc8bb5faea55ce57d45d3920d0ca02146173db3f0c1a4ad3e64c2882db77dd7bcfcf216299a993b282f582a69b7a373355a78e9adae3c301b0c11f3ce660d11b340be8d8f330b8360795784a153e34502e562f2924bdc494e5116e04cdad740c224017af8caabc47444efab9ace0610ee6890798d8ffecc771181715aef61c6a06d81a7e8331161736c0b1f08733612cfe382b3c8476f87865b4a94363d3a9", 0xd2}], 0x3, &(0x7f0000006f40)=[@cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [r1, r3, 0xffffffffffffffff, r1, r1]}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r2, r1]}}], 0x78, 0x24000000}, {&(0x7f0000006fc0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000008200)=[{&(0x7f0000007040)="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", 0x1000}, {&(0x7f0000008040)="68439dcdc632f4b42f1de38cd36b4825addc6abf6af739aedd419fa97f0762ba0f6bb1c6803931833c113a68cfe8a463c8a1d78b31e54b9ee28aadc3262530545bd0725641ef85d726cf3431934b40ebc60faad21457d2b993da6503ca96c776b2ab7e375513f7a22d613a49051aa2c685e315166fe4ac9658ecc90ad687a860d6109e5c75f7616992a473ec48a3345076e164a7f4fb685728dbc6f9e2c04ac01ad888a92b8da3697dec04fdf40e2bb2a2a151ba79a22ae059f810b0351f74c46db4019eb8072cfa80be411576cf4a57e21e4605efa2", 0xd6}, {&(0x7f0000008140)="eee4a1375c5a740021099918df178527a256bef6c9e084f0ac0f021802b1327a58d7839b04e266de201537537cfb81cfdf87fa1d07a99a21", 0x38}, {&(0x7f0000008180)="2a939d01a7dbe9ffe2f9e846c3d7cd0053b6eacdada8bdab82de9ac1abcf0050a5659ddb5390e2a5cacb3190945680245eb2a38da930860feec29bcc5f82de868fc0f2a03f335a80dd2ed16a8e7589b549afac430c5e6ffea7aa29c1256360e8af360e6cb31699e4bf87a6", 0x6b}], 0x4, 0x0, 0x0, 0x68c5}, {&(0x7f0000008240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000008540)=[{&(0x7f00000082c0)="54ce1e3cfa52a6adbbcae57905ded43dd5941725cf27f7b4f963d4ecaa67b6c4eb339facc8a2efebf3e8614abef0de2bb714f59f0c99220c02d73b7ee9ee7d1b3ed8ca694ce4f36b9ca480654f0fa9ccdbdb36694014ccd83712b354f2cfe41c169bc226d1e7706ad3e4c0169bc53ca2fa84a528bbea00f25b9711d8190d4c4dfc69a5bb8d09edc8d12768a1", 0x8c}, {&(0x7f0000008380)="1dec4e77be70a405b6e146c095197ca13b30e9484f84720dc649fbf850990410fc50a4b8847521be23bf2deb26547e47f834f3ad825e8984ac07ef050964392cd729e121e0b94b7eed7f69cc63ea6ef9b4614c6636569b1be9b98b213e6b29bff0a296fc64ec044e00c005d5f316586f3949af67f9f4406100ac4d7b200c83d879c4aae115de28b4e1f7c1e487408bc2e9544479c3bc2814c1bfcfeb7c4c80775421602a00155a4662d83c8c959b35d242d2ab105df73575e906e597853e03c606c56a656dd2cad0f76990b3ac", 0xcd}, {0xfffffffffffffffe}, {&(0x7f0000008480)="557e604a990cdd896c3127195f83e5bacea3ee2151a5b27f49b40a6d7de382a7ea26faf2f3d8e49392f46b4c1a2f55e61448bd40b4ac4386c7f14926e1f4dd1f045129f0eafcdd3a7c4ba3fbf79cb773846543d1535295c16703a2ebba3d17687a3856851cfda823a126d46c185614f987aa98500b3241588acda0cb10082c28cf47bebc0cdc", 0x86}], 0x4, &(0x7f000000c700)=[@rights={{0x10, 0x1, 0x1, [r3]}}, @cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @rights={{0x10, 0x1, 0x1, [r0]}}, @cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}, @cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @cred={{0x18}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, r0, r1]}}], 0xc0, 0x4040004}, {&(0x7f000000c7c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f000000dbc0)=[{&(0x7f000000c840)="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", 0x1000}, {&(0x7f000000d840)="5f9d5ecdfff72108b19729fbfde349deef24ccfe6ec7ccd936d4471a29117d84b6a7dd421db71c6b8772a8354cf9d8879862d22746f02e6be8c8aedb46fb3e089ec44b65caabc483745bcb5f8d7e297b93080a3b0c4a2f088e1f51793b07d7673203ffeabdb2c300c4fcda6e9cc882b2a6df5697627b1ea51e6b8411502e1ea854ab72cd0ef685e7c268f49d3aa02d4838f726edf36f9ba9862b2fdb502c84", 0x9f}, {&(0x7f000000d900)="544dcc45c66c3aba04e411ebb8a59ce2fb1134d756d17777bbb0ba86c0dc18203337dab8f80ede82365083b4f9fd91e75c68c358a1d5888e1c9afbd237d39b173606e2520d72003fb803f28b04dbd49d1f", 0x51}, {&(0x7f000000d980)="05154015a8c3e9e28ed1", 0xa}, {&(0x7f000000d9c0)="99f32420db719fcf8150db161e2b6439d1fa3c91b6dc22fb812e8b4a708a64cf756d9d609d74aaff54ffe2c834e55eed5ab18a8f8639d1ac90020c2ea5202bb6853874fe6f513a17b1e0a187a6fc10c2a1c01bdc54ca5d2978b06867e64000063eef43493a10c4ec1fdff6d6cdc79dcc041d21ab420f94f60d13b4079cb26dca02cc609e9a1c5b26cb1624e4e01a983b4669c2159bd2e7d80d97660cd2fa63094e1fa46144ef92548f4c817aa5caf459d590f73fbfcf261fb121d293703ff9a2f5063ca92dbff137e807cfaf1d3c92e7255545ade801857bfaf165693418977c8f18e21010220b97d4b1f8d0fefe97cdfb574c4dda20f53c", 0xf8}, {&(0x7f000000dac0)="a12972a16c800e74d0b7b229d279167e3f20a0d5567cefaa1653b889cee8906fc2e11c9969d18fbca54dc8576aaeca59c7a9265e4b83412273611e452d40c598bfc0668afeb77d18368a", 0x4a}, {&(0x7f000000db40)="4f53bd275b141cb5e2cc3020f9c993cf09ac3040e6445bdec299e1248eebf458275cf946560a0dff7505bc1c800e57de16305c7b8d74a4dfe9bb3a8d32b4b7c94306ec3b9fff849411f2facb8762ca366cc7552c82a466fe05f12e468af69d46658bc0e29fdb059e15984facef63410c909623e9aca8cade168753f7", 0x7c}], 0x7, 0x0, 0x0, 0x4000}, {&(0x7f000000dc00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000f100)=[{&(0x7f000000dc80)="c9af60", 0x3}, {&(0x7f000000dcc0)="2c6f50f622b69b1fada22c3e856ffeb38c973c51e6e7003527a44f53e499401eb8889424da4e4468ef3e0c6db2a0586545482e6dd98c00d75b5741d30d3135e7b9f4d6efd9529c8a6c54c879012c2931912ddce4f16680012d63c05c652dd54e9574a1d7481fcbc974935d85851fc2832e76a011a76532e18f800c0cb6a807ed0b9199991420e4c34e6c4a7d2cd8ff2a9700b1e67687b2a66ad1bbda836c12665a912a0eacddf8f99160eb62ff90744bc1c6046048cc4f35915ccbb509cd86f06a1dc1797c160d4efb28936707be21ce8211e72015f7cef2a723", 0xda}, {&(0x7f000000ddc0)="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", 0x1000}, {&(0x7f000000edc0)="7b70cb235b94e8c6fc49721d49b861a92c210bda8f6c4b36f9e105e1944e4149bccbf10aa28cd8ff6e2c6d5ec29a83c9f32e73b2ee22fe52b6d94a5e62f6e759af9bde3cf2132add2e3eae14956399002a656e660165ea2e3f23da75c383f86ff871be6efa161a39008a97b592aeb289993f87db3d140485b863c778ed9e1343728915ac8146a417095e9d24c0b0fccb02a7351ecae2eb4a78315ff9573e79b5b9c12d0bd6c037a6e7322df7f2b49998f90b3cfeee090566d2dbe04692e592f8e7d56db96e3520fc384720c138d0a10d1e67d4be3cb224c87706e9ddc5cf743921fc2a7dc8c40761ccddea97f8bf54e7e6668c10084a6ce700653753ac", 0xfd}, {&(0x7f000000eec0)="e2b58dcac9101cc070ac77a2fbb2d06439af17f91a1169dd827958661f1c0c426d07040ba4ed67104e98ecbc7c5fd1c3d83fb58eef9131e70b9833bf34068ba8d7d0dc65cc93c9f75c5870888c23254335af1f10bc2ad577d5ac1a579099233708522810074e46c211236a93a064eae1d96240951936fab9ba75b78724863b40f08a8dd1a71f8d99a58fdfa0bcdca6666bf291abb55f495cac6900fccba38e51e7bacb4966c2833e77d530a33f", 0xad}, {&(0x7f000000ef80)="5eacab99ed5933838281148a89c891d7dd1b67878c0ed7cb44f6192a70efba3ddfa3906e1b4a94570947472e34d43a375291bdb1793ce542bb564cfb1903e653c5dbbc02ab5b5637ea96ba6cf3a0a0e566a39ce3536544ed312dc08fed3fe0524a0193f5140a62a26d687abf4882edc1c4882f7107a0b0c3004a410e1fc9a91776266c6f89d80f992a95", 0x8a}, {&(0x7f000000f040)="9bce4a08894e28fc4c416798c4bde0faa0c86bdff990336d1b456ee29e78e4907920a1b300d27aa4a4f1d2c148c9630ff1435058142cb77c528540a41604ffe1e2aea6adcb6de322f23568e527d47922a74f2e6e633c7cf4a6714372f0ed4197a4365601492f83bfdf3d789b5a7e965f64a4b8b75621ccaf51f1c362524bf42637da9bfc1d1aa6b00793330d1a36a7393b512a1764f7a59c91948f2e0c6e06c984322cc6f55012b5bf619db5a66c08df309f", 0xb2}], 0x7, &(0x7f000000f280)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r3, r0, 0xffffffffffffffff]}}], 0x38, 0x20008840}], 0x9, 0x0) 09:38:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$bt_cmtp(0x1f, 0x3, 0x5) sendto(r3, &(0x7f0000000140)="35c8288870169bbc381ecc7c4dc69a35473b7192cbf05412", 0x18, 0x40000, &(0x7f0000000200)=@nl=@unspec, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x80003c, &(0x7f00000005c0)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030323134373737373737373712c91d7617a7fccfa4dd7af20f9b17935f9033c830e2d45f3b236d4f67e9040db695fb189c75ec7b43ac9adff6708e21aa7076d8bbb7e89474011a55c0afb0e1e5ff51f7e6d304c9a9947965e1089a13d912d6dd54c8f8097ab16b7e710f71c8d04cc0b25f01000037ea362a3b69962dc4dff9b035750ca5cee15bcd02880267263e539d2a324ecd17715ff236e5a89657b28e837788998ba58bf7a9b3d8d84d8fe47f5f7836e724"]) stat(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)) accept4(r1, &(0x7f0000000080)=@generic, &(0x7f0000000100)=0x80, 0x0) r4 = openat$bsg(0xffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x8000, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4000, 0x1) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x800) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000440)=0x1, &(0x7f0000000480)=0x4) 09:38:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5501, &(0x7f0000000380)=@usbdevfs_connect) 09:38:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) 09:38:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5509, &(0x7f0000000380)=@usbdevfs_connect) 09:38:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x80, 0x4) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000010000)="e2e1f5e09521e93c020000000c", 0x7ad, 0x400}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x810, 0xffffffffffffffff, 0x63c9000) 09:38:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) 09:38:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 287.109825][T10269] loop1: detected capacity change from 5 to 0 [ 287.177839][T10269] erofs: Unknown parameter '€' 09:38:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x550b, &(0x7f0000000380)=@usbdevfs_connect) 09:38:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="4800000013000100"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400070076657468305f746f5f6873720000000014001680100001800c0009000000000000000000c7ba4d88153d54d839b5977b71924b51a870ab11f076e9d3da3c9beb548b47b29fb0e7fed88a62e888a5309dc106d235c97053f7bfe43825cc6aae1db1d51e4ea0a388acef06de0e88ca530325b4aa18e4debfd10474434c70b5b0afd42bcd793ba2fbb44e02be501c05c591810a166f44a49ad60bc2bbb1a4c47dbeb6fc175fd3edd800400fde736e64dbb12a80b6b8"], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup(r3) sendmsg$nl_route(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x78, 0x0, 0x210, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6890}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2bc1}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000000}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x44800) r5 = dup(r2) sendmsg$nl_route(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_hsr\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x48}}, 0x0) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00', r1) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x101000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, r6, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2={0xfc, 0x2, [], 0x1}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c801) recvfrom$llc(r1, &(0x7f0000000040)=""/169, 0xa9, 0x0, &(0x7f0000000140)={0x1a, 0x4, 0x0, 0x92, 0x5, 0x2, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f00000038c0)=ANY=[@ANYBLOB="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"/345], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:38:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 289.822580][T10295] IPVS: ftp: loaded support on port[0] = 21 [ 290.971918][T10295] chnl_net:caif_netlink_parms(): no params data found [ 291.341915][T10295] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.349974][T10295] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.359975][T10295] device bridge_slave_0 entered promiscuous mode [ 291.470798][T10295] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.478180][T10295] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.490093][T10295] device bridge_slave_1 entered promiscuous mode [ 291.626017][T10295] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.676122][T10295] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.709780][ T8436] Bluetooth: hci4: command 0x0409 tx timeout [ 291.760134][T10295] team0: Port device team_slave_0 added [ 291.777829][T10295] team0: Port device team_slave_1 added [ 291.826815][T10295] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 291.834074][T10295] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.860923][T10295] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 291.886355][T10295] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 291.895893][T10295] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.923283][T10295] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 291.991487][T10295] device hsr_slave_0 entered promiscuous mode [ 292.011208][T10295] device hsr_slave_1 entered promiscuous mode [ 292.024526][T10295] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 292.032685][T10295] Cannot create hsr debugfs directory [ 292.521717][T10295] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 292.580128][T10295] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 292.599123][T10295] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 292.617836][T10295] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 292.963596][T10295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.996764][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.006291][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.028149][T10295] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.055910][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.065762][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.075367][ T8436] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.082784][ T8436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.139461][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.148856][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.158683][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.168018][ T8436] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.175268][ T8436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.184655][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.195665][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.206599][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.216903][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.238860][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.268751][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.279328][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.331455][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.341152][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.350773][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.360615][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.391144][T10295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 293.466077][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.474092][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.515168][T10295] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 293.787683][ T18] Bluetooth: hci4: command 0x041b tx timeout [ 293.807664][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.817747][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.889951][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.899909][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.922978][T10295] device veth0_vlan entered promiscuous mode [ 293.932798][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.943491][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.985190][T10295] device veth1_vlan entered promiscuous mode [ 294.063254][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 294.072934][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 294.082422][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.092387][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.115436][T10295] device veth0_macvtap entered promiscuous mode [ 294.137144][T10295] device veth1_macvtap entered promiscuous mode [ 294.202713][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.213444][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.224004][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.234676][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.244752][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.255471][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.265541][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.276222][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.290212][T10295] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 294.298231][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 294.307794][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.317254][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.327371][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.379086][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.390817][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.401010][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.411750][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.421875][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.432703][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.442831][T10295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.454697][T10295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.469048][T10295] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 294.485342][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.495964][ T1985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.525440][T10295] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.534849][T10295] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.543925][T10295] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.553050][T10295] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.931750][ T1022] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.940570][ T1022] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 294.951023][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 295.061103][ T962] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 295.071368][ T962] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 295.087523][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 295.475103][T10545] loop4: detected capacity change from 264192 to 0 [ 295.658365][T10551] loop4: detected capacity change from 14 to 0 09:38:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5514, &(0x7f0000000380)=@usbdevfs_connect) 09:38:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/210, 0xd2}, {&(0x7f00000001c0)=""/178, 0xb2}], 0x2, &(0x7f00000002c0)=""/98, 0x62}, 0x4db}, {{&(0x7f0000000340)=@ipx, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/9, 0x9}, {&(0x7f0000000400)=""/157, 0x9d}], 0x2, &(0x7f0000000500)=""/120, 0x78}, 0x3}], 0x2, 0x10042, 0x0) dup2(r1, r0) getsockopt$SO_BINDTODEVICE(r0, 0x6, 0x4, &(0x7f0000000000), 0x20a154cc) poll(0x0, 0x0, 0x0) 09:38:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) 09:38:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) [ 295.869280][ T18] Bluetooth: hci4: command 0x040f tx timeout 09:38:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) 09:38:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x551f, &(0x7f0000000380)=@usbdevfs_connect) 09:38:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) 09:38:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) 09:38:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5521, &(0x7f0000000380)=@usbdevfs_connect) 09:38:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) 09:38:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) [ 297.948427][ T18] Bluetooth: hci4: command 0x0419 tx timeout 09:38:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) 09:38:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5522, &(0x7f0000000380)=@usbdevfs_connect) 09:38:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) 09:38:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x5523, &(0x7f0000000380)=@usbdevfs_connect) [ 299.129292][T10608] encrypted_key: key user:syz not found 09:38:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x6364, &(0x7f0000000380)=@usbdevfs_connect) [ 299.959936][T10621] encrypted_key: key user:syz not found 09:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={'syz', 0x1}, &(0x7f0000001500)="85d83ee269bb5187fb043cd57a84c4324edb7c16bbfd0282cd4f04979ddaf5688ffb49b9f4a8f3291b3c22a293a1f2a805489a03144c106912ae2c894291278a43dcdfad124f378f2a50c0fa05f1db22dbc08b3a56d6738c4568fc3eacba15", 0x5f, 0xfffffffffffffff9) 09:38:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8913, &(0x7f0000000380)=@usbdevfs_connect) 09:38:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8914, &(0x7f0000000380)=@usbdevfs_connect) 09:38:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 300.841217][T10631] encrypted_key: key user:syz not found 09:38:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8933, &(0x7f0000000380)=@usbdevfs_connect) 09:38:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 303.601014][T10667] encrypted_key: key user:syz not found 09:38:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 303.985001][T10674] encrypted_key: key user:syz not found 09:38:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x400448c9, &(0x7f0000000380)=@usbdevfs_connect) 09:38:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 304.498714][T10680] encrypted_key: key user:syz not found [ 304.811488][T10684] encrypted_key: insufficient parameters specified 09:38:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 304.877735][T10685] encrypted_key: key user:syz not found 09:38:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x400448dd, &(0x7f0000000380)=@usbdevfs_connect) 09:38:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 305.213694][T10692] encrypted_key: key user:syz not found [ 305.706245][T10699] encrypted_key: insufficient parameters specified 09:38:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x400454ca, &(0x7f0000000380)=@usbdevfs_connect) 09:38:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 305.712767][T10698] encrypted_key: key user:syz not found [ 306.685659][T10713] encrypted_key: insufficient parameters specified 09:38:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:44 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:44 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40045506, &(0x7f0000000380)=@usbdevfs_connect) 09:38:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:44 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 306.733176][T10711] encrypted_key: key user:syz not found 09:38:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4004550a, &(0x7f0000000380)=@usbdevfs_connect) 09:38:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:45 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4004550c, &(0x7f0000000380)=@usbdevfs_connect) [ 307.920557][T10730] encrypted_key: key user:syz not found 09:38:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) request_key(&(0x7f00000013c0)='id_legacy\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)=']\\)^$},#$\x00', r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 308.950996][T10744] encrypted_key: key user:syz not found [ 309.613187][T10754] encrypted_key: insufficient parameters specified 09:38:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 309.788946][T10757] encrypted_key: key user:syz not found [ 310.366924][T10765] encrypted_key: insufficient parameters specified 09:38:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4004550d, &(0x7f0000000380)=@usbdevfs_connect) 09:38:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 310.599959][T10768] encrypted_key: key user:syz not found [ 311.202404][T10778] encrypted_key: insufficient parameters specified 09:38:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4004551e, &(0x7f0000000380)=@usbdevfs_connect) 09:38:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:48 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 311.553555][T10786] encrypted_key: insufficient parameters specified 09:38:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0x0) 09:38:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40047459, &(0x7f0000000380)=@usbdevfs_connect) 09:38:49 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 312.319397][T10797] encrypted_key: insufficient parameters specified 09:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0x0) 09:38:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40049409, &(0x7f0000000380)=@usbdevfs_connect) 09:38:50 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 313.198728][T10812] encrypted_key: insufficient parameters specified 09:38:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0x0) 09:38:50 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40085503, &(0x7f0000000380)=@usbdevfs_connect) 09:38:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:51 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4008550c, &(0x7f0000000380)=@usbdevfs_connect) [ 314.300262][T10830] encrypted_key: insufficient parameters specified 09:38:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:52 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 315.005435][T10840] encrypted_key: insufficient parameters specified 09:38:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 315.589728][T10848] encrypted_key: insufficient parameters specified 09:38:53 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4008550d, &(0x7f0000000380)=@usbdevfs_connect) 09:38:53 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:53 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:53 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40085511, &(0x7f0000000380)=@usbdevfs_connect) 09:38:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:54 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40087446, &(0x7f0000000380)=@usbdevfs_connect) 09:38:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:55 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40095505, &(0x7f0000000380)=@usbdevfs_connect) 09:38:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x40186366, &(0x7f0000000380)=@usbdevfs_connect) 09:38:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4020940d, &(0x7f0000000380)=@usbdevfs_connect) 09:38:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 320.545755][T10922] encrypted_key: insufficient parameters specified 09:38:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x402c5828, &(0x7f0000000380)=@usbdevfs_connect) 09:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 321.132735][T10935] encrypted_key: insufficient parameters specified 09:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:38:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x402c5829, &(0x7f0000000380)=@usbdevfs_connect) 09:38:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 321.874089][T10943] encrypted_key: insufficient parameters specified 09:38:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x402c582a, &(0x7f0000000380)=@usbdevfs_connect) 09:38:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x402c582b, &(0x7f0000000380)=@usbdevfs_connect) 09:39:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x402c5839, &(0x7f0000000380)=@usbdevfs_connect) 09:39:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x41015500, &(0x7f0000000380)=@usbdevfs_connect) 09:39:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:02 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x41045508, &(0x7f0000000380)=@usbdevfs_connect) 09:39:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 324.713960][T10981] encrypted_key: key user:syz not found [ 325.401844][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 325.414047][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 09:39:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045503, &(0x7f0000000380)=@usbdevfs_connect) 09:39:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000380)=@usbdevfs_connect) [ 327.445209][T11021] encrypted_key: insufficient parameters specified [ 327.467562][ T9900] Bluetooth: hci0: command 0x0406 tx timeout 09:39:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 327.913514][T11029] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 [ 328.261644][T11032] encrypted_key: insufficient parameters specified [ 329.598546][T11033] IPVS: ftp: loaded support on port[0] = 21 [ 330.025201][T11033] chnl_net:caif_netlink_parms(): no params data found [ 330.133007][T11033] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.141107][T11033] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.150874][T11033] device bridge_slave_0 entered promiscuous mode [ 330.163148][T11033] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.171306][T11033] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.181148][T11033] device bridge_slave_1 entered promiscuous mode [ 330.228393][T11033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 330.244751][T11033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 330.290625][T11033] team0: Port device team_slave_0 added [ 330.304882][T11033] team0: Port device team_slave_1 added [ 330.340976][T11033] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 330.348117][T11033] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 330.374521][T11033] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 330.389284][T11033] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 330.398186][T11033] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 330.425027][T11033] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 330.474014][T11033] device hsr_slave_0 entered promiscuous mode [ 330.483353][T11033] device hsr_slave_1 entered promiscuous mode [ 330.493458][T11033] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 330.504066][T11033] Cannot create hsr debugfs directory [ 330.735617][T11033] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 330.752426][T11033] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 330.776805][T11033] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 330.799179][T11033] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 330.896186][T11033] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.903527][T11033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.911561][T11033] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.919051][T11033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.993000][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.002725][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.050203][T11033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.074918][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.083801][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.101422][T11033] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.128673][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.138409][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.148338][ T8767] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.155571][ T8767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.164785][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.174639][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.183960][ T8767] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.191304][ T8767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.212532][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.234501][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.258111][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 331.268478][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.278631][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.295064][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 331.305350][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.334322][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 331.344221][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.365087][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 331.374747][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.393061][T11033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.432405][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 331.440391][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 331.464222][T11033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 331.547917][ T7] Bluetooth: hci5: command 0x0409 tx timeout [ 331.589883][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 331.599471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.643768][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 331.652778][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.672155][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.681311][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.695302][T11033] device veth0_vlan entered promiscuous mode [ 331.720879][T11033] device veth1_vlan entered promiscuous mode [ 331.769098][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 331.779013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 331.788282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.798200][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.816673][T11033] device veth0_macvtap entered promiscuous mode [ 331.841924][T11033] device veth1_macvtap entered promiscuous mode [ 331.875081][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.885791][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.895857][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.906482][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.916615][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.927247][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.937422][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.948041][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.958525][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.969170][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.983021][T11033] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 331.994363][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 332.003837][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.013631][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.024106][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.051888][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.062456][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.073552][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.084222][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.094243][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.104869][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.114890][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.125506][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.135557][T11033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.146216][T11033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.160099][T11033] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 332.171444][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.181871][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.205802][T11033] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.214886][T11033] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.223802][T11033] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.232795][T11033] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.541766][T11262] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 332.551469][T11262] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 332.561847][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 332.688156][ T1022] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 332.696119][ T1022] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 332.706168][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:39:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8004550f, &(0x7f0000000380)=@usbdevfs_connect) 09:39:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 333.340280][T11292] encrypted_key: insufficient parameters specified 09:39:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045510, &(0x7f0000000380)=@usbdevfs_connect) [ 333.659360][ T18] Bluetooth: hci5: command 0x041b tx timeout 09:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 334.343651][T11305] encrypted_key: insufficient parameters specified 09:39:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:11 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045515, &(0x7f0000000380)=@usbdevfs_connect) 09:39:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 335.225328][T11323] encrypted_key: insufficient parameters specified 09:39:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:12 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={0x0, 0x989680}, 0x0) 09:39:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:12 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045518, &(0x7f0000000380)=@usbdevfs_connect) [ 335.708112][ T18] Bluetooth: hci5: command 0x040f tx timeout 09:39:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:13 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={0x0, 0x216000, 0x800, 0x7ff}, 0x1c) [ 336.140701][T11338] encrypted_key: insufficient parameters specified 09:39:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 336.404568][T11342] encrypted_key: insufficient parameters specified 09:39:13 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045519, &(0x7f0000000380)=@usbdevfs_connect) 09:39:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:14 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) 09:39:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 337.342161][T11359] encrypted_key: insufficient parameters specified 09:39:14 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, &(0x7f0000000380)=@usbdevfs_connect) 09:39:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x4, 0x0, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x9b, &(0x7f0000000100)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:39:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 337.400304][T11361] encrypted_key: key user:syz not found [ 337.707816][ T3400] Bluetooth: hci1: command 0x0406 tx timeout [ 337.789169][T10923] Bluetooth: hci5: command 0x0419 tx timeout 09:39:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:15 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80085502, &(0x7f0000000380)=@usbdevfs_connect) [ 338.360093][T11375] encrypted_key: insufficient parameters specified 09:39:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:15 executing program 5: add_key$user(&(0x7f0000000140)='user\x00', 0x0, &(0x7f0000000240)="f0", 0x1, 0xfffffffffffffffc) 09:39:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:16 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80085504, &(0x7f0000000380)=@usbdevfs_connect) [ 338.389655][T11376] encrypted_key: key user:syz not found 09:39:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='numa_maps\x00') 09:39:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 339.242961][T11388] encrypted_key: key user:syz not found [ 339.700117][T11397] usb usb9: usbfs: process 11397 (syz-executor.2) did not claim interface 0 before use 09:39:17 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8008550e, &(0x7f0000000380)=@usbdevfs_connect) 09:39:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x9b, &(0x7f0000000100)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:39:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz'}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:17 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8008551c, &(0x7f0000000380)=@usbdevfs_connect) [ 340.073410][T11404] encrypted_key: key user:syz not found 09:39:18 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000003680)={&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000003540)=[{&(0x7f0000000080)="1f", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x24000010) 09:39:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 340.815012][T11416] encrypted_key: key user:syz not found 09:39:18 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8008551d, &(0x7f0000000380)=@usbdevfs_connect) 09:39:18 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0x127e, 0x0) 09:39:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:19 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/asound/seq/clients\x00', 0x0, 0x0) 09:39:19 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80086301, &(0x7f0000000380)=@usbdevfs_connect) [ 341.598645][T11428] encrypted_key: key user:syz not found 09:39:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:20 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8010550e, &(0x7f0000000380)=@usbdevfs_connect) 09:39:20 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) [ 342.425731][T11444] encrypted_key: key user:syz not found 09:39:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:21 executing program 5: socketpair(0x18, 0x0, 0x1, &(0x7f0000003080)) [ 343.181694][T11459] encrypted_key: key user:syz not found 09:39:21 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x802c550a, &(0x7f0000000380)=@usbdevfs_connect) [ 344.024126][T11473] encrypted_key: key user:syz not found 09:39:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:22 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x0) [ 344.167011][T11475] encrypted_key: key user:syz not found 09:39:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8038550a, &(0x7f0000000380)=@usbdevfs_connect) [ 344.875759][T11488] encrypted_key: key user:syz not found 09:39:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 345.005070][T11489] encrypted_key: key user:syz not found 09:39:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000140)=@raw=[@func, @ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}], &(0x7f0000000180)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x101}, 0x10}, 0x78) 09:39:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000380)=@usbdevfs_connect) 09:39:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 345.622026][T11500] encrypted_key: key user:syz not found 09:39:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 345.897025][T11502] encrypted_key: key user:syz not found 09:39:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x335bc0}], 0x4, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) close(0xffffffffffffffff) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:39:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0045878, &(0x7f0000000380)=@usbdevfs_connect) 09:39:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 346.260280][T11512] encrypted_key: key user:syz not found [ 346.581778][T11514] encrypted_key: key user:syz not found 09:39:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 346.667261][T11517] encrypted_key: key user:syz not found 09:39:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 347.132953][T11527] encrypted_key: key user:syz not found 09:39:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0045878, &(0x7f0000000380)=@usbdevfs_connect) 09:39:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 347.352321][T11530] encrypted_key: key user:syz not found 09:39:25 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)) [ 347.961973][T11541] encrypted_key: key user:syz not found 09:39:25 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc004743e, &(0x7f0000000380)=@usbdevfs_connect) 09:39:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 348.175575][T11546] encrypted_key: key user:syz not found 09:39:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 348.755119][T11552] encrypted_key: key user:syz not found 09:39:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0085504, &(0x7f0000000380)=@usbdevfs_connect) 09:39:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140), &(0x7f0000000200)=0xa0) 09:39:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 349.019919][T11559] encrypted_key: key user:syz not found [ 349.736619][T11566] encrypted_key: key user:syz not found [ 349.763192][T11570] encrypted_key: key user:syz not found 09:39:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc00c5512, &(0x7f0000000380)=@usbdevfs_connect) 09:39:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:27 executing program 5: openat$vimc0(0xffffffffffffff9c, &(0x7f0000002780)='/dev/video0\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) 09:39:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 349.821163][T11569] encrypted_key: key user:syz not found 09:39:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 350.154727][T11574] encrypted_key: key user:syz not found [ 350.612446][T11581] encrypted_key: key user:syz not found [ 350.722543][T11586] encrypted_key: key user:syz not found 09:39:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105500, &(0x7f0000000380)=@usbdevfs_connect) 09:39:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:28 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x56a, 0x331, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_open_dev$hidraw(&(0x7f0000000200)='/dev/hidraw#\x00', 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x14, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\"\b'], 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000380)={0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="200f2000000020112bdab3259b4eaef1029200723283c730ef4181d30b4ff514f7373de2d4"], &(0x7f00000000c0)=ANY=[@ANYBLOB="00030600000000000000"], &(0x7f0000000640)={0x0, 0x22, 0x12, {[@global=@item_4={0x3, 0x1, 0x2, "b14d717b"}, @main=@item_4={0x3, 0x0, 0x0, "0ac6f8e3"}, @main=@item_012={0x1, 0x0, 0xa, "cb"}, @main=@item_4={0x3, 0x0, 0x4, "7165cea4"}, @local=@item_012={0x0, 0x2, 0x4}]}}, 0x0}, &(0x7f0000000600)={0x18, 0x0, &(0x7f0000000440)={0x0, 0xa, 0x1, 0x4}, 0x0, &(0x7f00000004c0), &(0x7f00000005c0)={0x20, 0x3, 0x1, 0x6}}) r1 = syz_open_dev$hidraw(&(0x7f0000000200)='/dev/hidraw#\x00', 0x0, 0x481) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f00000007c0)={0x0, "4d9c1e03418348cefbe9fa5fdeffac4e0406aafe312555568b912d838b1e0df336da8e549619acbb48dc04e3a1de0c75b566eef5487c4ca90e63069638fc5be1"}) 09:39:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 350.724865][T11587] encrypted_key: key user:syz not found [ 351.293908][T11594] vhci_hcd: invalid port number 23 [ 351.304941][T11594] vhci_hcd: default hub control req: 0000 v0000 i0017 l0 09:39:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105502, &(0x7f0000000380)=@usbdevfs_connect) [ 351.353372][T11595] encrypted_key: key user:syz not found [ 351.589650][T11601] encrypted_key: key user:syz not found [ 351.621005][ T8438] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 351.622026][T11603] encrypted_key: key user:syz not found 09:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) [ 351.670567][T11602] encrypted_key: key user:syz not found [ 351.979279][ T8438] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 351.996155][ T8438] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 352.007467][ T8438] usb 6-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.40 [ 352.016685][ T8438] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:39:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)=@usbdevfs_connect) [ 352.171630][T11610] encrypted_key: key user:syz not found [ 352.241808][T11613] encrypted_key: key user:syz not found [ 352.259816][ T8438] usb 6-1: config 0 descriptor?? 09:39:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 352.480486][T11619] encrypted_key: key user:syz not found [ 352.759666][ T8438] wacom 0003:056A:0331.0002: unknown main item tag 0x0 [ 352.865103][ T8438] wacom 0003:056A:0331.0002: hidraw0: USB HID v0.00 Device [HID 056a:0331] on usb-dummy_hcd.5-1/input0 [ 353.055551][T11629] encrypted_key: key user:syz not found [ 353.167894][T11631] encrypted_key: key user:syz not found [ 353.569852][ T9900] usb 6-1: USB disconnect, device number 2 [ 354.367824][ T5] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 354.728418][ T5] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 354.739755][ T5] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 354.750063][ T5] usb 6-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.40 [ 354.759655][ T5] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 354.800184][ T5] usb 6-1: config 0 descriptor?? 09:39:32 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x40040, 0x0) 09:39:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185502, &(0x7f0000000380)=@usbdevfs_connect) 09:39:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) [ 355.047701][ T5] usbhid 6-1:0.0: can't add hid device: -71 [ 355.054175][ T5] usbhid: probe of 6-1:0.0 failed with error -71 [ 355.136708][ T5] usb 6-1: USB disconnect, device number 3 [ 355.161613][T11666] encrypted_key: key user:syz not found 09:39:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8116cb759710b8604512ce823670e0e9744535ff2640ce12281006e3da379922450adda987f43c884dc08015790656560f9beec90c639427e7e06546c12821ca29efc3145b5907d34520d4ac46516ca5819435906750a444ee0a9afe1", 0xb9, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185503, &(0x7f0000000380)=@usbdevfs_connect) 09:39:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f000000e9c0)) [ 355.223544][T11667] encrypted_key: key user:syz not found [ 356.053828][T11684] encrypted_key: key user:syz not found 09:39:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) [ 356.060364][T11682] encrypted_key: key user:syz not found 09:39:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185504, &(0x7f0000000380)=@usbdevfs_connect) 09:39:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:34 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x0, 0x0) 09:39:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) [ 356.271410][T11687] encrypted_key: key user:syz not found [ 356.952044][T11699] encrypted_key: key user:syz not found 09:39:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185505, &(0x7f0000000380)=@usbdevfs_connect) 09:39:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:34 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:39:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) [ 356.965212][T11698] encrypted_key: key user:syz not found 09:39:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185506, &(0x7f0000000380)=@usbdevfs_connect) 09:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f2", 0x2f, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:35 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000140)=@raw=[@call, @generic={0x9, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x0, 0x4df5, 0x101}, 0x10}, 0x78) 09:39:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:35 executing program 0: ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x0, 0x1, 0x0, 0xa, 0x30}], &(0x7f0000000180)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x3}, 0x8, 0x10, 0x0}, 0x78) [ 357.899281][T11717] encrypted_key: key user:syz not found 09:39:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185507, &(0x7f0000000380)=@usbdevfs_connect) 09:39:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f2", 0x2f, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:36 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x80182) 09:39:36 executing program 5: r0 = io_uring_setup(0x3d0e, &(0x7f0000000000)) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x5) [ 358.753196][T11730] encrypted_key: key user:syz not found 09:39:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185508, &(0x7f0000000380)=@usbdevfs_connect) 09:39:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:37 executing program 0: epoll_wait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x1) 09:39:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f2", 0x2f, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create1(0x0) poll(&(0x7f0000000100)=[{r1}, {r0, 0x21}], 0x2, 0x240000) [ 359.693867][T11746] encrypted_key: key user:syz not found 09:39:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185509, &(0x7f0000000380)=@usbdevfs_connect) 09:39:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:38 executing program 0: syz_io_uring_setup(0x49d, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:39:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018550a, &(0x7f0000000380)=@usbdevfs_connect) [ 360.594221][T11764] encrypted_key: key user:syz not found 09:39:39 executing program 0: socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3d, 0x0, &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000001500)={'syzkaller1\x00', 0x3}) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, 0x0, 0x0) write(r0, &(0x7f0000003900)="476f97ae3808d0212c686f22efab65d8d9de7c46c58533b655c2bae4ca161320abab95954b9675c0c40a5fbd99fcdef42b5ff9f36eca9e932124c9d33e37f6595e24bde6bd19c6f3f84d2a0839caae82f3d0bc153f92a1e35a19881159e91486fc2daff8a2c2c65d1d82863688f14f60b3b960135b76bfe90c256dc0d0d263abd3c06d76fb1b545c8c9a321499712d641ccaa1a008381d50b9c49b8382031360b34b5f4688e1c07f1566fec095d7d22987163f2633d2b280b0a77f255de962d8872104d3280391052b", 0xc9) [ 361.509697][T11782] encrypted_key: key user:syz not found 09:39:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:39 executing program 5: memfd_create(&(0x7f0000001340)='/dev/full\x00', 0x0) 09:39:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018550b, &(0x7f0000000380)=@usbdevfs_connect) 09:39:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x42, 0x0) write(r1, &(0x7f0000003900)="476f97ae3808d0212c686f22efab65d8d9de7c46c58533b655c2bae4ca161320abab95954b9675c0c40a5fbd99fcdef42b5ff9f36eca9e932124c9d33e37f6595e24bde6bd19c6f3f84d2a0839caae82f3d0bc153f92a1e35a19881159e91486fc2daff8a2c2c65d1d82", 0x6a) [ 361.768617][T11789] encrypted_key: key user:syz not found 09:39:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:40 executing program 5: syz_open_dev$sg(&(0x7f0000001080)='/dev/sg#\x00', 0x101, 0x0) [ 362.821328][T11805] encrypted_key: key user:syz not found 09:39:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018550c, &(0x7f0000000380)=@usbdevfs_connect) [ 363.010135][T11810] encrypted_key: key user:syz not found [ 363.319855][ T5] Bluetooth: hci2: command 0x0406 tx timeout 09:39:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 09:39:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2b10a0931c36a279d138327575ff41995409f0b660b87a0df2a10fcf8db0dcc5a6a96431f161f7605b773d8ff32f254f5338037bd613806ac0fcf19cd4b291435f83f77c1ac69a896c6416bf50c3d00bd79dbebc3a045caee9df001e8", 0x5d, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:40 executing program 5: io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 363.692329][T11822] encrypted_key: key user:syz not found 09:39:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018550d, &(0x7f0000000380)=@usbdevfs_connect) 09:39:41 executing program 0: syz_io_uring_setup(0x55a4, 0x0, &(0x7f0000feb000/0x13000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000002c0), 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) syz_io_uring_setup(0x1f64, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x18e}, &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000fed000/0x4000)=nil, 0x4000, 0x2000009, 0x10, 0xffffffffffffffff, 0x0) [ 363.846491][T11825] encrypted_key: key user:syz not found 09:39:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:42 executing program 5: sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 09:39:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018550e, &(0x7f0000000380)=@usbdevfs_connect) 09:39:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:42 executing program 0: io_setup(0xf8a, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 09:39:42 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, 0x0) 09:39:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018550f, &(0x7f0000000380)=@usbdevfs_connect) 09:39:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xf}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0), 0x1081, r0}, 0x38) 09:39:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 09:39:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185510, &(0x7f0000000380)=@usbdevfs_connect) 09:39:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 09:39:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) 09:39:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:44 executing program 0: io_setup(0x4, &(0x7f0000000000)) 09:39:44 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200), 0x8}) [ 364.634926][T11842] encrypted_key: key user:syz not found 09:39:44 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185511, &(0x7f0000000380)=@usbdevfs_connect) 09:39:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 09:39:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 09:39:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:44 executing program 0: syz_io_uring_setup(0x55a4, &(0x7f0000000240), &(0x7f0000feb000/0x13000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_io_uring_setup(0x1f64, &(0x7f0000000400), &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) 09:39:45 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 367.375174][T11893] encrypted_key: key user:syz not found 09:39:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185512, &(0x7f0000000380)=@usbdevfs_connect) 09:39:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 09:39:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 09:39:45 executing program 0: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x1) [ 368.021573][T11902] encrypted_key: key user:syz not found 09:39:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x8, 0x101}, 0x14}}, 0x0) 09:39:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185525, &(0x7f0000000380)=@usbdevfs_connect) 09:39:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 09:39:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) 09:39:46 executing program 0: open(&(0x7f0000001040)='.\x00', 0x10000, 0x0) 09:39:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185548, &(0x7f0000000380)=@usbdevfs_connect) [ 368.891021][T11928] encrypted_key: key user:syz not found [ 369.989152][T11944] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:39:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x8, 0x101}, 0x14}}, 0x0) 09:39:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:47 executing program 1: syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 09:39:47 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0xd8) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x8010, 0xffffffffffffffff, 0x68a99000) fcntl$dupfd(r0, 0x406, r0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000640)={0xa, 0x0, 0xfffffffd, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0xc6, 0x0) 09:39:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000000000020"], 0x24, 0x0) chdir(&(0x7f0000000380)='./file0\x00') rmdir(0x0) creat(&(0x7f00000000c0)='./file1\x00', 0x0) 09:39:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018554c, &(0x7f0000000380)=@usbdevfs_connect) 09:39:48 executing program 5: epoll_create1(0xb3fdc8d87290cf9c) 09:39:48 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)) 09:39:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:48 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 09:39:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018555c, &(0x7f0000000380)=@usbdevfs_connect) 09:39:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00', r0) 09:39:49 executing program 1: open(0x0, 0x4b6000, 0x0) 09:39:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:49 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xa00, 0x0) 09:39:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 09:39:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185560, &(0x7f0000000380)=@usbdevfs_connect) 09:39:50 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000100)=[{r0}, {r1}], 0x2, 0x5dc) 09:39:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x2, 0x2000000088) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r1, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:39:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:50 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:39:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185568, &(0x7f0000000380)=@usbdevfs_connect) 09:39:50 executing program 3: mq_open(&(0x7f0000000000)='-:^^(/\x00', 0x0, 0x0, 0x0) 09:39:50 executing program 5: io_setup(0x4, &(0x7f0000000000)=0x0) r1 = epoll_create1(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003600)='/dev/vcs\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000003680)=[&(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 09:39:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:51 executing program 0: r0 = getpgrp(0x0) ioprio_get$pid(0x1, r0) 09:39:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018556c, &(0x7f0000000380)=@usbdevfs_connect) 09:39:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r0, &(0x7f0000000040)=""/40, 0x28) 09:39:51 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x40004007fff, 0x32fe3cf1}, 0x14) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x11, &(0x7f0000000080)=0xfbf1, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000000)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendfile(r1, r0, 0x0, 0x4000000000edb9) 09:39:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r2, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002500)=[{&(0x7f0000000200)=""/242, 0xf2}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4}, 0x0, 0x3, 0x6, 0x0, 0x4, 0x300000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0)=0x3, 0x4) preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0, 0x0) 09:39:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:52 executing program 3: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}) 09:39:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x840, 0x0) 09:39:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185574, &(0x7f0000000380)=@usbdevfs_connect) 09:39:52 executing program 3: io_setup(0x5, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 09:39:52 executing program 5: r0 = socket(0xa, 0x3, 0x2) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 09:39:52 executing program 0: r0 = epoll_create1(0x0) fstatfs(r0, &(0x7f0000000080)=""/155) 09:39:53 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, 0x0, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 09:39:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc018557a, &(0x7f0000000380)=@usbdevfs_connect) 09:39:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000100)=[{r0, 0x21}], 0x1, 0x240000) 09:39:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) 09:39:53 executing program 0: poll(&(0x7f0000002780), 0x2f, 0x0) 09:39:53 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {}, [@IFA_LOCAL={0x4, 0x2, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}]}, 0x2c}}, 0x0) 09:39:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) 09:39:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc01855a1, &(0x7f0000000380)=@usbdevfs_connect) 09:39:54 executing program 1: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:39:54 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x1, 0x0) 09:39:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 09:39:54 executing program 0: syz_io_uring_setup(0x52a0, &(0x7f0000000040)={0x0, 0x0, 0x8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 09:39:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', 0x0, 0x0, 0x0, r0) 09:39:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185e00, &(0x7f0000000380)=@usbdevfs_connect) 09:39:55 executing program 0: poll(&(0x7f0000002780)=[{}], 0x1, 0x0) io_setup(0x4, &(0x7f0000000000)) 09:39:55 executing program 1: open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x2b0, 0x180, 0x0, 0x148, 0x180, 0x148, 0x218, 0x240, 0x240, 0x218, 0x240, 0x7fffffe, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1fb, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 09:39:55 executing program 5: io_setup(0xf8a, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0xde, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x64e8]}, 0x8}) 09:39:55 executing program 3: io_setup(0x4, &(0x7f0000000000)=0x0) r1 = epoll_create1(0x0) io_submit(r0, 0x1, &(0x7f0000003680)=[&(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 09:39:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0189436, &(0x7f0000000380)=@usbdevfs_connect) 09:39:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0x0) 09:39:55 executing program 1: r0 = creat(0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000570035f4c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb0000"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x8010, r0, 0x68a99000) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000640)={0xa, 0x0, 0xfffffffd, @local, 0x1}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0xc6, 0x0) 09:39:55 executing program 0: epoll_create(0x167e) 09:39:56 executing program 5: syz_io_uring_setup(0x49d, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0xa0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:39:56 executing program 3: mkdir(&(0x7f0000000000)='.\x00', 0x0) 09:39:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc020660b, &(0x7f0000000380)=@usbdevfs_connect) 09:39:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key(&(0x7f0000000200)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0x0) 09:39:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00') 09:39:56 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="189cde71a00f5ecfc9b38d2e8035804c50735dcb8cf0672e481c0b747f1614dc7ed91b227a408b68ec4f7153f620d3989d2d374fad4f832368c0266ed1796effc576dbdb0b7b32645e7813f73a1d172428da312c53b6a0d47b38de42e586577ca4524a010346d35f2f4870c6d0a979e8a829b6e7e4851aedfca4782adff3f0ccca9c3512507234eeaf059e6bab5c4147ea1aa991e281fe6ea895d1c80656c8f2b0fec4952525ba42d62de1bc528c29461d56776e31845c47b452a76738f1239eb9c275ef3edc2bb34e4b089e0cdbccf0d775859c130b8a4b24416db7951911e2f99018494fba25f826be4e6977681fcbb9e4d247e5b248ab82b6b1dc81295c", 0xff}, {&(0x7f00000001c0)="36ca1f10d4f2c2", 0x7}], 0x10000000000000ef, 0x0, 0xffffff1d}, 0x0) 09:39:57 executing program 3: open$dir(&(0x7f0000000100)='./file3\x00', 0x200, 0x65a81da01bce73f) 09:39:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect) 09:39:57 executing program 5: r0 = creat(0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000570035f4c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009"], 0xd8) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1100) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x8010, r0, 0x68a99000) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000640)={0xa, 0x0, 0xfffffffd, @local, 0x1}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0xc6, 0x0) 09:39:57 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 09:39:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x104) r0 = openat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0, 0x0) fcntl$setown(r0, 0x6, 0x0) [ 375.417154][T12041] encrypted_key: key user:syz not found [ 380.426530][T12145] vhci_hcd: invalid port number 23 [ 380.437859][T12145] vhci_hcd: default hub control req: 0000 v0000 i0017 l0 09:39:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x104) r0 = openat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) dup2(r3, r0) 09:39:57 executing program 4: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xc600000000000000}) 09:39:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x2}) 09:39:58 executing program 0: r0 = socket(0x18, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2}, 0xc) 09:39:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x158) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00') 09:39:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x1d8) mkdir(&(0x7f0000000280)='./file0/file1\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x0) 09:39:58 executing program 4: select(0x40, &(0x7f0000000040)={0x6}, 0x0, 0x0, &(0x7f0000000100)) 09:39:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x3}) 09:39:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) [ 382.303542][T12175] vhci_hcd: invalid port number 23 [ 382.308926][T12175] vhci_hcd: default hub control req: 0300 v0000 i0017 l0 09:39:59 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 09:39:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x1d8) mkdir(&(0x7f00000000c0)='./file0/../file1\x00', 0x1c9) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file1/file0\x00') 09:39:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x158) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00') 09:39:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x158) mkdir(&(0x7f00000000c0)='./file0/../file0\x00', 0x0) r0 = getuid() chown(&(0x7f0000000080)='./file0/../file0\x00', r0, 0x0) 09:39:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x4}) 09:40:00 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8}, 0x0) 09:40:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/17, 0x11}], 0x1) 09:40:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = getuid() fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', r0, 0xffffffffffffffff, 0x0) [ 383.035789][T12190] vhci_hcd: invalid port number 23 [ 383.041262][T12190] vhci_hcd: default hub control req: 0400 v0000 i0017 l0 09:40:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000001500)=[{0x0}], 0x1) 09:40:00 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x5, 0xffffffffffffffff) write(r1, 0x0, 0x0) 09:40:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x5}) 09:40:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x158) mknod$loop(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 09:40:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x1d8) mkdir(&(0x7f00000000c0)='./file0/../file1\x00', 0x1c9) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00') 09:40:01 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) [ 383.835869][T12206] vhci_hcd: invalid port number 23 [ 383.841387][T12206] vhci_hcd: default hub control req: 0500 v0000 i0017 l0 09:40:01 executing program 5: select(0x40, &(0x7f0000000040)={0xdeadbeef}, 0x0, 0x0, 0x0) 09:40:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x6}) 09:40:01 executing program 0: readv(0xffffffffffffffff, &(0x7f0000001440)=[{0x0, 0xfffffffffffffef8}], 0x1) 09:40:01 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/49, 0x31}], 0x3b, 0x0, 0x2a}, 0x0) sendmsg$unix(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="ff5ecf49abb1d4741ba23e26ece5c72293418e9973b099f814f9f4c92a962e086ec8317dd69d14a0c13d6df25ce21dd0409c", 0x32}, {&(0x7f0000000240)="729b3e5648cc5421e8bc145c9e65fbb317ecc8a24c2bd51ee2a11318a1ffeb5ca6639b22ec70267ff6bad260e1b7c125052f62995d049153140c867b69f73d0cc1913bef23a88cfc136ab12ce0da1cb8c16c396b9aa9a9db8d6fb60fc1be14", 0x5f}], 0x2}, 0x0) 09:40:01 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0xb, &(0x7f00000005c0), 0x252}, 0x0) [ 384.617537][T12222] vhci_hcd: invalid port number 23 [ 384.622833][T12222] vhci_hcd: default hub control req: 0600 v0000 i0017 l0 09:40:01 executing program 4: open$dir(&(0x7f0000000180)='./file0\x00', 0x200, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 09:40:01 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=""/141, 0x8d}, 0x0) sendmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)='S', 0x1}], 0x1}, 0x0) 09:40:02 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = dup2(r0, r0) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000040)=@in6, 0xc, 0x0}, 0x0) 09:40:02 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x7}) 09:40:02 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000140)=@file={0x0, './file1\x00'}, 0x10, &(0x7f0000001740)=[{&(0x7f0000000180)="a65a78b8b26023772aed4b889df83ed0bd6d384d3ec20871065804e67334aec441aaf1d2b84ddab578ccd5330aeb034b427decec0405ba6d7be1025a228fa41b9c4a694bc2b5f58c45addd331d77cf913003cd0f4aff", 0xffffffffffffff62}, {&(0x7f0000000200)="07f0fbbed23b5530be7fa4d70fb87bca8799eb9a4303df3e73d0cc91bf4d1ffb3845f9dd05af4a8d1bb9689c44c86e22cd81d5bbf756055517a595533625610c7093", 0x42}, {&(0x7f0000001a80)="c95b92681ecddb4eb9fa9ba101f1e76aa3f0043b471c38deb52c95adb877838d7ee0a0621e574fe2472ac3623ddb8feb755f2ca57c14d839393aed989dc915c893532e88e483568cd4db9e20878eed2f1d470be8b465b9c5f7e66c8f52caf1aeae655591504c8dffeb4820a96bd296ff8342eec3ae8d2d0baa90d15234c79e3cab5e7a1a459804bbfae3452aa74d07420ab14d2d22c00e4bf9a3ac9b7888293b917962a8995f45f0106440ec380a882f2c34c149493c2e06678700f42bd5360592a9f8c4cf33c63f1fd6fd30bac0e06b33d3e1f972bc88028ceee0c23f27ef089281b3d681381381a6022e4e9b815261f346e259dc3d837139060afb18abde31e8d80e638a6e22950c72253bc45a8cc668a2ebc944373aec65", 0x9e}, {&(0x7f0000001bc0)="c43e6ade94489dd185c656869e3add06c5c4d331131c83f639fdfa0de244a0b571b9b21bcb30d5a59bc708d2c83cbc9613772d8d384fef31b63f1f28dcd4b91bcdeb7562a32e6febb6c8e61141b4c1a2f60215607775f02e409b8e7dabc736a3df8d5eddb5bc497b6696b840ffcdcc42e26f941925df68073d243089a88d92f5f6a795200733f8058a7c7b5c31db019b4bed9cf56c8eb1d3847568c26d30dc0d664c76cd75b8906f340f924a712da20db7149c4b85ccaa92c3eeee244f37d851dcee9ff96224eefdfc7162624ad88b46262463a3b9ae62e989fdf9725719dc048fb708b838764656de2b948695611161ddd3bc19324533b1c655d1aea0fcc2f529c7638da5f6eaf294afdaf4c836d854e4fd7eeff2f021fbb44ca04062a47534ad1f3c8ce37440fa20264983abda827072dff100598e3947acf4cbef46fdea80d7bd69ff458529a5aa82145232c8d7045d4bd76166a8e8dd6797cb4034d159dd3f406c61232d6a7d73ed78c19a2296c7d4e25a6e28b4867fbe6d86b3ffd2083a73a0ef39f13598e3d1c5be1c24ec9172336a7761b2c7801701c3c27539378b4c2866a60591b05720f651f73e7e6587e2627ef10c21acdef17ca5a2cc4f0ff6fea020326926d385a42e65efdf0cb9dac9551736bb3240d91b93aa29d9e5d8576ce78842baf39cf58dacec3bd402438f3b313434f650d5405b1e717fc20f79e568eeb2ae5b39bad321e0e39ddd9654617cbb20adcf1cf8c0dca142152f8518826554d0469f995dc3b7fb388e8e041031a23f57af0ede183bde37cb85c49ef173872c6dc2372a01db408ab6a518b05448e3238459e1876ec0122e6b115635af349c43c8296ca904796ea3be1e6a7b12d81fa113727f7da623a37a6dfb5a053bd8088087fe259ffe592246c73f4ff0bb681c99a02d2788e1664e22f1ed9af0dd075f5da8cd1b9022b236e0e7d50429fada814f3ec61e7a82df97bb84cea205b408666fc15ba6c86a28448735e5a29a1c52d86d353958498fdac3c95eef976c9eaed070eb383def2a4664980f065ab5e673a259837dae49a56f790214afa905de50f588a701aaaee145746bb1bbf0f0b1879c7c8afd3427e34d970fcf08ec146fa63e6a5a190ff30bf6bc4d03a46007115fa889b774ff4dfb474cb5f5aae6a8e015c15a4810e884246e1909cb511a26af52515ae886f57c5eb2a1965b644615734972ab8711fed8726154c20860da8d0e041999c2b71c5dcbff2eba44ff800ef046853ede9f55f3bea043cac4f0a63588ac4ae7728758b3d845061612b6864cdb3c40da02a073adb18610d137442062c7e264ab340934c379ff1aceab280ad583d81ac2bb9fe94be5ff5284344568c49c7cdd49c930845b4feae7b10ee9e474a23ec6795d6e2b8de173ac89877b1384fe10e23be84deb04704247285a843f9240339c0800890f5fa0c566cbf9522d0e8cc0b27379b323578cd3c1190d7d0b00e6af27bcaff42408ad887bfdfeae14a5ee38fc55a1154c50cc27896676dd89385e7d4731cc71679c4388f339f1c9ad29371c46f58e3e61bec5808c8b888e61940b1841030944c0af507f93843339fb9b76ef049258562ef7984e0397d738e6f30f7358e9df6150792083fb6649d20491409386ddeeed7d6e2e9cd70f4f898e98a90fd8b8aaaab2598e19cfbcbc2b66da95bf60c433e428e26dc4b57ce28e7acf9763252cd5a1b3383de7a2d9ed15a41caea27a2d343b1c906e887ac0808e4ba49ca4fd6448efcf82b57130aef15ed9a0dcbfd767a784f70cf430959e76226bf08b5d6d8a0803dd0db7a7222ffe5fae3a6cc282dacf1e03913e3780ea999c57e217f32f74cf207b8d7fd05af6ffb0172753bf1d5cf6083db3e37151daec961bb254bfa8e78ede04769631bf986dd19370ac01d6cbae7bba0c0bbd8b08e99acf8b792da4eef738ed420339eb3d46797e121ba795cb013d6ca4fce88e628c1f4d6a41b45a5fac684a39ee549b063b373ff752b8fd105edfae4cc16d39f011307be4a701edceedd772a2dc48a6a3616aaf3eebfa6ac13f9f27110c2faf2b200340d924076ae7d632bc9a43c286beddbd1b88d4b0fde7e4f1fe7e376ba2e6d86d24956334e158cc8a2fdb30b2533eb127c4d450e78b6feca0a2a7c8bb88436577aab4dd1d99da071a31a9930401cde2968432d2ef08a2943cc6560cd275cd580835311286853e79b969e89091bcb5300261f45ef43df9a4537bca77678269e0e424ba6519387acb21961e278ffad855ff1a19c336fb903479e374b9dd591a1dad64d3a44809d754bdda5ad27288855a16a85c4b2ca11ea11a8f7915c553f9bb517a64c1436345c025451a2c78e68d10a1c53ca23e0afb74f8b9166178bb12e4c5709e749ae9c982c67bf2d5b4a62ab9be59b201edf77c0d4e95372369d32f31c2feba572cfd7305ff4e77909fb4e3641c9eb6c8289ac33e042954e846595df6c3b02bfc2d9add49356b1f0232d2ecb9dcff6528ea11d0464af95e7708c2a3c840bf6de428a0361a9ff931c19877456ecc513f733de1ccbf2ffc9f6d4881e45c5d661c96f71cdd444775033daeab63e3fc24e3d48cb4ba799649d8710a513c447ca6fe985b5885e873d6303ca81673c7b98401793d81dfffc32d8a4ebd2e70fbc0f0a57631c1049412869b1cdb0d5779cbe7d0962623d9f5574e1992535c2121b2f8bf4f7ba0703e1ca80f4a70bc52a9d379cd23dfa0594dfdd9288b7d52d2242b5419fb4b2698da796f4f48201028e377361c9f4b6598453cd387af61bd8fc48949d3dfa6dcefb4fa9099700fa71aa9afd51a62edf8ffb172a34b601f014102b286e06b2388462c883e18a9834d959536bb02e3f93df8bcf8812c8c3b23e31c34c1a66716b8fea7b8edd6a61dac230d777faa674ee9dfd541b0056170c39848aea67547dd25b8fe7bca4061f3065ea177e63bcc93df01ce43c6ac6fe09584d007918817b6e58145a8717a8bc54902640850f6e524cb44268b1b9eecc4eb7beb726d611e121788fa306cc08f508a110780f3c2957fd455405a68926e91a96560aefdfa571c649c925f40deab4e088d2383a657b38d7445c4b9e71f76cdda9c37ce8edee75c596b7be31c00b88556a8d23e451750f6db5a11beee292da13a2ed6474bda64a923b9552097a5f937e617a66de595ff80c47d0a4474a65ec409626c2314975ec632b825f78ccfc346ac12e2c8ee281f761efd3fe59f9f906595315a05d5309ccdc3bfbe38ea57e03365dda175e7c3945e92c64c3def103f7a4ddde60c32d6d765c2efde24b941a5165428b4e7656f9ee1a163bd27d0b287bb51fc2251a2e268667028363962c9df41cc4f61cf6dba7228862bcb3e06e9834d6811432376351f855ae6e31fbddc36640959473cb2e19fffded7b8f7d0d9091034e76e6d9c89bab25c189db65ea64119f48c618591d2870cd6dd33db38b2e9fc8b4c09ca813fb30c125db99aea23c78c40a155bccf081c683b582ea86e6bbde6f65169c2e4bb4811fa6f6d98590a043af9b4f9bd18e20187821911a43929f8565808ca9f2c3510a0f1029ab253be161b17b336e5f13776fe2080b5fe20174d1619d13d37e2e973450ef876af34e7c0a18e79a99121757b026509fc92c099b89dc32a66eb48c769704e46c0ddd66020e694f68dbb2694c4cf657462826f1960a65757da3bc7d0922628cdebfc407a36d550e733dd5486dca65f2d21b865ef040224e8832276d4d02b272ee3b914ad072f707589c2cede840965302794251e4dfafd5107edb2f9bec4b8dd52823732cd0f6fd55e55a8681c9ab32b5b6463ce86d69ec594f30da9886d8d1b86a556c37732ffef555ac067637e5138e9d439d7e7b3082c14c31eed1a34f136899b69fdbb48f8fdd15c857a3b1c673bcad52ac79cada05a62f7b870fe652415785283e57800e37c8b71f6e0c285e5b6bc82d1ca8cf1b74e81c4c4d993cf699b63d2ffd89da4beeb0f824e32e04f9f20b665d86289fbcf64c1f46c861e9fbbbb299437bad19eb569974b8048482eed588b348435242949011aa152845bf6878a6bee5233600db83a1fc963e646b02367b28a9cd0e0cc07abec080df054a0661e650b0f46226adfc65e6be50a3363f1746bd3ca5327540c5782bc99a64446f94454e0d5ca34a1239d386d5c50da5f2775052335bfed1f0c9127013711cf8dc3ea65be2d420f5225ff9501ad7fd20f99595a8c8ed910df444213cb8fe0edbe653558a6b1703bf10c5068c6a4bdedf90baa2d5975720ef02f666b6ee6402c983504f1297c6be1913a02dff4c9407cd44358f1b0046ce1034ded460db1a9ecd5e29e51a7a59957cc920d0a50cce041cf279844d13dbdbf93f628aef43e9744dbbf0db81070dd9d83afc822d9d66d0ea1b8cd5f63be30102aa78009c48091e83931880adef39a503bdc7fe60bd9c8837b763d898b06a04a79def67102b3d72b55a99a17e7725c716f45b03c0e7d89f3b9a962b025a5c7e4e69546b1a6324f7a81aab1514133ea3abc4b9912a8505d75a9ba5bc6c4fa36718cf8feec003def77022d1371459e6c943d06406f7b8714b72fbae4a2cbad3245343ba9220bd67eaaf93e7d126e3a96088155cd04e2a913ea52ee8cc97ec4ff6a3843143d1bbf6382a5d75e2d658b42827dc58ebb13d603dae0c3906954f703427f57cff5ed9e52ad0af0c9fd47747b9fe1f3a248077414283d0ecc738a7e8d4c5ff9a7d1283de7143305b134adcff806b791c884336f7ab4ab178ae3e3d80d8b3ddd12bfda4ad5d233b7301fe2483631f4a633f2ffa44316cef0ed0adba97f8b088a5e43abe46d98ed16da0f8864a4440964ee79c0349427cb756000f049fb5740d306a5a8959c28ae74d3f7e8df76669a502c9132ee7a7d67da35e5d577581483bd653b652dab54fc33264919f85a432ac618c750e7849f9b6adf9d0d157e389be8f2487c6cdcb51d4d1fefb212d09d25fa9914071509e19c6da950dcc261ea15d8d7899e88ed5ae396426d9f49f9a08dea7b819a6c9ac3a91bdc82622479628f0fed8ff325a6909eca284f97970656687fecd1a36c706146634a568c20845be324066dd7e861d28d72677225faba7f58af616d75e62be11fdd330aa920dde8351efc366b749c12e9b009b35f4fb99ec640bd06891ac7a9168ba8e1234f2a3a7ee2ed40a3a99118f96d4195af74004c1e1695ae108b263cc0855aac4c4623373b3112e3b858796fe7d92e7071cee77e0709f6e07c16a33de07cd436b518f0a00e1b59f112c3d7b4aeefe413d870c793f002a471142eb027cb3abcb150b942d32121381a7a2813da493682c60f6a86ed7e4c2501c5065f955f80fe45957af6b7326cac4047568f8b8b4dbfeb83c7fc1d35afeb80dafbfd96153e5d0768d5bb86998bd77cbf89e39df0bd8c2120cfb9b668cf7e681708dcd54a826df4fdcadd3b9112a1f7a7211769a0c476b890222806b0b129e817ebd2b4c11a3ce6372465f2c26ded7d2dd868d0b87e0a9896eca35baec4da100d6e4e7cd57a195eaa629139f59536aaa4dbc8d19ae089ef559fee0b2d212af4b5b8d1cf26c5e0cc143dc15f45c6e7beecf7a0594271ba087c454cdbc903b64652320c248771bc11497e59255c19c9d02b51e9d6f5119bb67eeb4ae447410d599556daa5a49cf9c0bd58fcd01e4f464f5581c69e3da5494515f44b38109af94f0e50df50a93772100bc2c6c185f1ce96612e0e0a3277e6250be191075ffedf2fc1d4f765c0339562dbdb80db9bea50ad864ffac93beb14cff569f7bfcb1379848103a1582f088aa7cc5c788b10c0e79956b7ccf7e61923b4c623960d25ad38cc14fc9128f092eb815f959189ad2cb57b378223622159eb0f14dcb134e9c73d3feaee0c4ea24cab4bba014ca4fd4e0fa982dfccf63953f4ad3bcc73ababc857ed081673527e0a962ae42c50b87595462bbda79c5e9350d3b79f4965cc8545e8fe49256d8611fe4f8022645f8d89766cf5f3e8f291a963f6ad9502b2f2f18a2348a0a1661c04f8e7825f67b39047d568dc43b2b433a00e48dbd752a66b02e7bf21d1563263f359ee725091677a0a377c0d22358cb997575c52dcd54c921b0dc19b3959b209a3da80c7865e72a1dd0aed2cad63cb0909fbc0ee60", 0xffffffffffffffc0}, {&(0x7f0000000340)="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", 0x184}, {&(0x7f0000001440)="cc837f0cfe7e5ead1a3486ecd82f42963a0785cccd50771e72b689966b05bd8d85a0c55cdd0133891d7a22b00799fc859a70e26a6eff9d3d8f019635981a771043edc90716c26d9b5bf3a90bf0b0ebb75e7eb4baae11cd648ccf79b5213c76c6b603e9046bd61289496fb4f3c77ad4", 0x6f}, {&(0x7f00000014c0)="59da0efb2e7eddd3ab9dc738", 0xc}, {&(0x7f0000001500)="83581ba6edaecc4c797d746f2a2cc17e87fc2461360ce8913e400e1350cdb5dd46d3d7478f096b1a70eeeed07ef33c13b59bc3c52db4c495dfeb8d485ff4b452eaf128386ad4f69599f3b246e7f61ce9e2cd71ea4e7bd500f8dea1cedbd813f53d329245855ded05a9749063279a1de6e2998891bfce1194202695e71849faf331babae6677dac1a1ee10a916402fa8e1bc9ce628044fcebc07dcb02cc2e8dcf4aa17e1cdca0576e1ced", 0xaa}, {&(0x7f0000000280)="c7844f0a9294f33f3041944ff209d5137b8e8dfa6ec2992fd394a34f352b9874f5f8ebded71ae89c116865967b1f0bb3b3d10363c8f2f9f33b4c6c5b2a13ecc043ca66121be5d95e940dadb3e2d4f995e2d822743302e7bfffe25527e7fd18b94577bf32bf1f8cab346317500259a4a0ef1f9ebc76840fc5261c15d8e4ddcbfd7ecf0de22e32afb90a348ad3ad7107794a6fb1ba7ad1657aee761d29b1f64a18", 0x76}, {&(0x7f0000001640)="1ed4253eaecb229e0120799aa10dfb8df6b2193a9ee48137edf4f51b75dada6bc3f97916019d235ac6e38679f3054ff5333723d0fa7914a3102b90162b1602273b0c767441cb280a5a0dbb77534c34ca53c195ce90f16644ba820002eb7484bacd743213e59b903e12c127b46cbc0dd551bf00508b3f4e091ee0421920aade3ecb20841313573bf8670a1a3ef5cfe55ad80fed36953d9f0090540670ff792ede3fcc73b81f08ebbf6a3aee4b7f65a0a5567ced244131c2e4c17b6aead698144a2c9cec83534f4d4903d889dd9f2c9711ad02", 0xd2}], 0x10000006, 0x0, 0x0, 0x411}, 0xf) 09:40:02 executing program 1: r0 = socket(0x18, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) 09:40:02 executing program 4: pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup2(r0, r1) syz_open_pts(0xffffffffffffffff, 0x0) [ 385.433046][T12239] vhci_hcd: invalid port number 23 [ 385.438550][T12239] vhci_hcd: default hub control req: 0700 v0000 i0017 l0 09:40:02 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/63, 0x3f}], 0x1}, 0x802) sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000340)="ed59610b384831a6e075fc70444e972e27c325f490c4ff6ef98d1db5db9f2c1af9a2e3cf525de67847a851e5a17d8890f5921274d0ed34c8458770843dd896a2", 0x40}], 0x1}, 0x0) 09:40:02 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 09:40:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x8}) 09:40:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x150) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, 0x0) 09:40:03 executing program 1: select(0xfffffffffffffe7a, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100)) 09:40:03 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="8a39cc6de0f84b2f04", 0x9, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/49, 0x31}], 0x3b, 0x0, 0x2a}, 0x0) sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000340)="ed59610b384831a6e075fc70444e972e27c325f490c4ff6ef98d1db5db9f2c1af9a2e3cf525de67847a851e5a17d8890f592", 0x32}], 0x1}, 0x0) [ 386.254281][T12254] vhci_hcd: invalid port number 23 [ 386.259807][T12254] vhci_hcd: default hub control req: 0800 v0000 i0017 l0 09:40:03 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x681, 0x0) 09:40:03 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, @val, {@ipv4}}, 0x0) 09:40:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x9}) 09:40:03 executing program 1: syz_emit_ethernet(0x2fbf, &(0x7f00000002c0)={@broadcast, @local, @val, {@ipv6}}, 0x0) 09:40:03 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="189cde71a00f5ecfc9b38d2e8035804c50735dcb8cf0672e481c0b747f1614dc7ed91b227a408b68ec4f7153f620d3989d2d374fad4f832368c0266ed1796effc576dbdb0b7b32645e7813f73a1d172428da312c53b6a0d47b38de42e586577ca4524a010346d35f2f4870c6d0a979e8a829b6e7e4851aedfca4782adff3f0ccca9c3512507234eeaf059e6bab5c4147ea1aa991e281fe6ea895d1c80656c8f2b0fec4952525ba42d62de1bc528c29461d56776e31845c47b452a76738f1239eb9c275ef3edc2bb34e4b089e0cdbccf0d775859c130b8a4b24416db7951911e2f99018494fba25f826be4e6977681fcbb9e4d247e5b248ab82b6b1dc81295c", 0xff}, {&(0x7f00000001c0)="36ca1f10d4f2c2", 0x7}], 0x10000000000000ef, 0x0, 0xffffff1d}, 0x0) [ 386.832429][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 386.839174][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 09:40:04 executing program 0: r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x200, 0x0) readv(r0, &(0x7f0000001280)=[{0x0}], 0x1) 09:40:04 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001440)=[{0x0}], 0x1) fchown(r0, 0x0, 0x0) 09:40:04 executing program 4: pipe2(&(0x7f0000001880), 0x0) [ 387.096814][T12269] vhci_hcd: invalid port number 23 [ 387.102375][T12269] vhci_hcd: default hub control req: 0900 v0000 i0017 l0 09:40:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000001500), 0x1) 09:40:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xa}) 09:40:04 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendto$inet6(r2, &(0x7f00000004c0)='|', 0x1, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000340)="ed59610b384831a6e075fc70444e972e27c325f490c4ff6ef98d1db5db9f2c1af9a2e3cf525de67847a851e5a17d8890f5921274d0ed34c8458770843dd896a28f9936019a407a002ff5f0c2b23108885e76efc9b7be0832baac158c9447de7bf39825981dc4bd1197d317e7d55c1236f29dff5973a6699de083e3e826be8dff8ceb917a37fc2cdd5c6d3f93bcfd3cce", 0x90}, {&(0x7f0000000240)="b0cf6a3403225053e1f1b77dbe680c5efe60f6c699f6d626dd8e9941d6130d93f41bc4ab2b9850de95136bfd619d99191950e4d1e34d226e5e1c4b77c04ee9488d6d24ef44d47672644d89b95a7f8bc6ff1f031da531f8d4c468070e30d38fa61f073c3a2e7954a0196c6d6ea8c8a8f74fcf8854c925dd8ae77c942671ee706865db2d9c869657d8fedc7c3002af3f261e46b9cf40dd33487be2120677da6a06979776c8420b9538873889594c8c2e345060de754da83c0d7d3c8ba6df9c2a871bd98743c536028fecdfe71a217b44ef4f334f4b", 0xd4}, {&(0x7f0000001640)="5277054685b2120539bff4f5994f66039fed29333e344a3edc6a799506960c0665a185182baab24781540b23490b1d5a34ab3e21e243f6d5718d5a06b049783aa7b0f265b01919af0a050b30849bfa542a44daab67827f7fb6a3033bf13eacdc952dbe63060000009876043eb8541d6a0f741dbcbbe5f3b784953e70e3aad56ed79940f0dfda477a5c7f805d02cf8df018726b564d21ee176a1be4afd6", 0x9d}], 0x3}, 0x0) 09:40:05 executing program 5: r0 = socket(0x18, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, 0x0, 0x0) 09:40:05 executing program 0: select(0x40, &(0x7f0000000040)={0x4}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000080)={0x5}, 0x0, 0x0, 0x0) 09:40:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x158) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) [ 387.963515][T12285] vhci_hcd: invalid port number 23 [ 387.969098][T12285] vhci_hcd: default hub control req: 0a00 v0000 i0017 l0 09:40:05 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xb}) 09:40:05 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="251751fbea6420bbceca92576208ede1143f8dd5650dfb098f9c3e65708ae06e841b8aeb94bcff9bfcffbe0313875e6b526386007eeda841549df689c9b8704d8956cbd901aee85f324a5ae28b7d02f1c7bf7e96169abcee6289217fbabaf75687bbce2c81f76f3c537f01f514f1da09ba078cabfc2e32461433e1052d3088ca6feea9904ea93f6d2d0e64a09c0a83300e", 0x91}], 0x1}, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 09:40:05 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_buf(r0, 0x29, 0x21, 0x0, 0x0) 09:40:05 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1c7000, 0x0) 09:40:05 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x5, 0x0) [ 388.682865][T12302] vhci_hcd: invalid port number 23 [ 388.688514][T12302] vhci_hcd: default hub control req: 0b00 v0000 i0017 l0 09:40:05 executing program 4: syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x940, 0x0) 09:40:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xc}) [ 388.907592][ T9900] Bluetooth: hci3: command 0x0406 tx timeout 09:40:06 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_buf(r0, 0x29, 0x4e, 0x0, 0x0) 09:40:06 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) connect$caif(r0, 0x0, 0x0) semget$private(0x0, 0x4, 0x249) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', r0) recvmsg$can_j1939(r0, &(0x7f0000001340)={&(0x7f0000000180)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, &(0x7f0000001280)=""/188, 0xbc}, 0x10000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001380)={0x0, @empty}, &(0x7f00000013c0)=0xc) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000003cc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000003c80)={&(0x7f0000001400)=ANY=[@ANYBLOB='X(\x00\x00', @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="140002006970360000000014000200766c616e300000000000000000000000080003000300000008080100"/52, @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x2858}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) 09:40:06 executing program 3: r0 = semget$private(0x0, 0x0, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000140)=""/206) 09:40:06 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) [ 389.390249][T12314] vhci_hcd: invalid port number 23 [ 389.395548][T12314] vhci_hcd: default hub control req: 0c00 v0000 i0017 l0 09:40:06 executing program 4: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x94031, 0xffffffffffffffff, 0x8000000) 09:40:06 executing program 1: getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f00000001c0)) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 09:40:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xd}) 09:40:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x105481) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 09:40:07 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 09:40:07 executing program 0: socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)) 09:40:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e20, @loopback}]}, &(0x7f0000001300)=0x10) [ 390.175517][T12330] vhci_hcd: invalid port number 23 [ 390.181016][T12330] vhci_hcd: default hub control req: 0d00 v0000 i0017 l0 09:40:07 executing program 1: syz_open_dev$I2C(&(0x7f0000000080)='/dev/i2c-#\x00', 0x0, 0x0) 09:40:07 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xe}) 09:40:07 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000600)='ethtool\x00', 0xffffffffffffffff) 09:40:07 executing program 0: syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x105480) 09:40:07 executing program 5: syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x105481) 09:40:08 executing program 4: r0 = gettid() clone3(&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r0], 0x1}, 0x58) 09:40:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000001380)) [ 391.161958][T12348] vhci_hcd: invalid port number 23 [ 391.167519][T12348] vhci_hcd: default hub control req: 0e00 v0000 i0017 l0 09:40:08 executing program 3: fsopen(&(0x7f0000000000)='fuse\x00', 0x0) 09:40:08 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 09:40:08 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xf}) 09:40:08 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x143902, 0x0) 09:40:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x105481) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) [ 392.075347][T12363] vhci_hcd: invalid port number 23 [ 392.081134][T12363] vhci_hcd: default hub control req: 0f00 v0000 i0017 l0 09:40:09 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x80182) 09:40:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000003b80)={0x8, 0x2, &(0x7f0000000080)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:40:09 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0xc0, 0x0) 09:40:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x3f, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, 0x0) 09:40:09 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x10}) 09:40:09 executing program 1: socketpair(0x1d, 0x0, 0x0, &(0x7f0000001600)) 09:40:10 executing program 3: recvmsg$qrtr(0xffffffffffffffff, 0x0, 0xffffffffffffffca, 0x0) 09:40:10 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000140)) 09:40:10 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0xc0000) [ 393.133633][T12381] can: request_module (can-proto-0) failed. 09:40:10 executing program 5: socketpair(0x26, 0x0, 0x0, &(0x7f0000000200)) [ 393.203906][T12381] can: request_module (can-proto-0) failed. 09:40:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x11}) 09:40:10 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600)='ethtool\x00', r0) 09:40:11 executing program 3: socketpair(0x28, 0x0, 0x0, &(0x7f0000000d00)) 09:40:11 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_gettime(r0, 0x0) 09:40:11 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0x1a}, 0x10) [ 393.974067][T12394] vhci_hcd: invalid port number 23 [ 393.979523][T12394] vhci_hcd: default hub control req: 1100 v0000 i0017 l0 09:40:11 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x20301, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) 09:40:11 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x12}) 09:40:11 executing program 1: syz_open_dev$I2C(0x0, 0x0, 0x0) 09:40:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00', r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={0x0}}, 0x0) 09:40:12 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 09:40:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, 0x0) [ 395.065001][T12408] vhci_hcd: invalid port number 23 [ 395.070554][T12408] vhci_hcd: default hub control req: 1200 v0000 i0017 l0 09:40:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x105481) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000005f00)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 09:40:12 executing program 1: socketpair(0x11, 0x3, 0x0, &(0x7f0000000d00)) 09:40:12 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x25}) 09:40:12 executing program 3: shmctl$IPC_SET(0x0, 0x1, 0x0) 09:40:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001280)={0x4, &(0x7f0000001200)=[{0x401, 0x6}, {0x1c2, 0x4, 0x2, 0x1ff}, {0x8, 0x4, 0x80, 0x3}, {0xffff, 0x80, 0x1f, 0xf33}]}) 09:40:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000004380)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x0, @empty}}}, 0x90) [ 395.973218][T12428] vhci_hcd: invalid port number 23 [ 395.979132][T12428] vhci_hcd: default hub control req: 2500 v0000 i0017 l0 09:40:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2040) 09:40:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x105481) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 09:40:13 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x48}) 09:40:13 executing program 4: socket(0x18, 0x0, 0xa3) 09:40:13 executing program 0: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140), 0x0, &(0x7f0000000200)={0x0, r0+10000000}, 0x0) 09:40:13 executing program 3: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/255) 09:40:14 executing program 5: getresuid(&(0x7f0000000080), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)) [ 396.919356][T12444] vhci_hcd: invalid port number 23 [ 396.924678][T12444] vhci_hcd: default hub control req: 4800 v0000 i0017 l0 09:40:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00', r0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00', r0) 09:40:14 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x4c}) 09:40:14 executing program 4: pselect6(0x40, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x1]}, 0x8}) 09:40:14 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) 09:40:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0xc) 09:40:14 executing program 5: prctl$PR_SET_THP_DISABLE(0x29, 0x0) fork() [ 397.841792][T12464] vhci_hcd: invalid port number 23 [ 397.847030][T12464] vhci_hcd: default hub control req: 4c00 v0000 i0017 l0 09:40:15 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)=ANY=[@ANYBLOB="0000522cc0"]) 09:40:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000680), 0x8) 09:40:15 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x3f, 0x40) 09:40:15 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x7000) shmctl$SHM_STAT(0x0, 0xd, 0x0) 09:40:15 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x5c}) 09:40:15 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) 09:40:15 executing program 1: sched_rr_get_interval(0x0, &(0x7f00000001c0)) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) [ 398.706495][T12480] vhci_hcd: invalid port number 23 [ 398.711906][T12480] vhci_hcd: default hub control req: 5c00 v0000 i0017 l0 09:40:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x40090) 09:40:16 executing program 4: setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080), 0xfffffffffffffca6) 09:40:16 executing program 3: socket$inet_udplite(0x2, 0x2, 0x11) 09:40:16 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x60}) 09:40:16 executing program 5: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:40:16 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r0, 0x40096100, &(0x7f0000000240)) [ 399.515619][T12496] vhci_hcd: invalid port number 23 [ 399.522031][T12496] vhci_hcd: default hub control req: 6000 v0000 i0017 l0 09:40:16 executing program 4: fsopen(&(0x7f0000003e00)='mqueue\x00', 0x0) 09:40:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x0, @loopback}]}, &(0x7f0000001300)=0x10) 09:40:17 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x68}) 09:40:17 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) recvmmsg(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x160, 0x0) 09:40:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b0000000010901"], 0xb0}}, 0x0) 09:40:17 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 09:40:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) 09:40:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x11) [ 400.994463][T12594] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.1'. [ 401.046152][T12596] vhci_hcd: invalid port number 23 [ 401.053532][T12596] vhci_hcd: default hub control req: 6800 v0000 i0017 l0 09:40:18 executing program 1: socketpair(0x11, 0xa, 0x3ff, &(0x7f0000000080)) 09:40:18 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x6c}) 09:40:18 executing program 5: socket$inet_udplite(0xa, 0x2, 0x88) [ 401.384131][T12602] sctp: [Deprecated]: syz-executor.0 (pid 12602) Use of int in max_burst socket option. [ 401.384131][T12602] Use struct sctp_assoc_value instead 09:40:18 executing program 4: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 09:40:18 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000400)={{0x7, 0x0, 0x0, 0x0, 'syz0\x00'}}) 09:40:18 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000002c0)="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"/341, &(0x7f00000000c0)=@buf="9b3e5f243c5ce84d8beef448930aa1d0e47f1bf9b7db8c121a1da53ecd7b2a4cea7be374f05f66445851c2772b02c53eced03520b094ec2326148216683f9dcd6ac4d6c962fc37864483c4a4e4ba6e7dd22d98b9dd82cf631dc2e8dc931741602fd2c12f56a70ca6043bdc0caa4bef16bbf88ea6da6282be4f10eaa8511d707844dad403bea0e5edee03", 0x4}, 0xffffffffffffff9f) [ 402.004602][T12611] vhci_hcd: invalid port number 23 [ 402.010250][T12611] vhci_hcd: default hub control req: 6c00 v0000 i0017 l0 09:40:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f00000003c0)=0xe3) 09:40:19 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000100)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 09:40:19 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) connect$caif(r0, 0x0, 0xffffffffffffffe1) 09:40:19 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x74}) 09:40:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180), 0x8) 09:40:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@filter={'filter\x00', 0xe, 0x4, 0x288, 0xffffffff, 0x130, 0x130, 0x0, 0xffffffff, 0xffffffff, 0x1f0, 0x1f0, 0x1f0, 0xffffffff, 0x4, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'veth1_to_batadv\x00', 'ipvlan1\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@local, @private, 0x0, 0x0, 'caif0\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@tcpmss={{0x28, 'tcpmss\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) 09:40:19 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dri/renderD128\x00', 0xc000, 0x0) 09:40:20 executing program 0: clock_gettime(0x3, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)={0x0, r0+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x1]}, 0x8}) 09:40:20 executing program 1: clock_gettime(0x3, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140), 0x0, &(0x7f0000000200)={0x0, r0+10000000}, 0x0) [ 402.903565][T12630] vhci_hcd: invalid port number 23 [ 402.909172][T12630] vhci_hcd: default hub control req: 7400 v0000 i0017 l0 09:40:20 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1, 0x0) 09:40:20 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 09:40:20 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x7a}) 09:40:20 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f00000001c0)="18b3b0f4ce1eb740dddfecd50a85a70eada5929a998f88f506936ffbe8ab55df6224243a90ce9bcb073d807e8e8576937dde4a24712bd2c11a73921e6456d9eaa536fa00c0ae6d44970291082b2d5656a77f1c1a230eb9acf96e717ff6d5a8a6c1831e42e6d88c8e9b5eef9fe64b8358393806f36e92", &(0x7f00000002c0)=""/249}, 0x7a) 09:40:20 executing program 0: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0x989680}}, 0x0) 09:40:20 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x191340) [ 403.665606][T12643] vhci_hcd: invalid port number 23 [ 403.671099][T12643] vhci_hcd: default hub control req: 7a00 v0000 i0017 l0 09:40:20 executing program 4: fsopen(&(0x7f0000000540)='securityfs\x00', 0x0) 09:40:21 executing program 3: pipe(&(0x7f0000004800)) 09:40:21 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xa1}) 09:40:21 executing program 5: clone3(&(0x7f0000000400)={0x200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:40:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5}, 0x40) 09:40:21 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 09:40:21 executing program 4: syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) [ 404.590907][T12657] usb usb9: usbfs: process 12657 (syz-executor.2) did not claim interface 23 before use 09:40:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001740)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000001600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:40:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x102}) 09:40:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_address={0x5, 0x7, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, 0x48}}, 0x0) 09:40:22 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000400)) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000440)={0x1, 0x4, @name="2773f16770f81fb213919f523b38a0084a9de4359c00affbd84fb07690b7c09a"}) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@ax25={{0x3, @default}, [@null, @rose, @remote, @null, @bcast, @bcast, @bcast, @bcast]}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000240)=""/9, 0x9}, {&(0x7f0000000280)=""/191, 0xbf}, {&(0x7f0000000500)=""/168, 0xa8}, {0x0}, {&(0x7f0000000380)=""/86, 0x56}], 0x5, &(0x7f0000001440)=""/4096, 0x1000}, 0x2020) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000840)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000700)}], 0x1, &(0x7f00000009c0)=""/214, 0xd6}, 0x2020) lseek(0xffffffffffffffff, 0x0, 0x1) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f00000002c0)={0x1, @pix_mp={0x0, 0x0, 0x32315842}}) ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, &(0x7f0000000340)={0x800, 0x29, 0x1, 0x7f, 0x3, [0x7fffffff, 0x7ff, 0x27, 0x7b]}) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020a00}, 0x6d70) open_tree(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x1000) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) fcntl$setsig(r1, 0xa, 0x27) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') 09:40:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080), 0x8) 09:40:22 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x10000000) 09:40:22 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:40:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x120}) 09:40:23 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)=ANY=[]) 09:40:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001f00)={0x0, 0x8}, 0x10) 09:40:23 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000400)) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000440)={0x1, 0x4, @name="2773f16770f81fb213919f523b38a0084a9de4359c00affbd84fb07690b7c09a"}) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@ax25={{0x3, @default}, [@null, @rose, @remote, @null, @bcast, @bcast, @bcast, @bcast]}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000240)=""/9, 0x9}, {&(0x7f0000000280)=""/191, 0xbf}, {&(0x7f0000000500)=""/168, 0xa8}, {0x0}, {&(0x7f0000000380)=""/86, 0x56}], 0x5, &(0x7f0000001440)=""/4096, 0x1000}, 0x2020) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000840)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000700)}], 0x1, &(0x7f00000009c0)=""/214, 0xd6}, 0x2020) lseek(0xffffffffffffffff, 0x0, 0x1) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f00000002c0)={0x1, @pix_mp={0x0, 0x0, 0x32315842}}) ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, &(0x7f0000000340)={0x800, 0x29, 0x1, 0x7f, 0x3, [0x7fffffff, 0x7ff, 0x27, 0x7b]}) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020a00}, 0x6d70) open_tree(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x1000) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) fcntl$setsig(r1, 0xa, 0x27) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') 09:40:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, 0x0) [ 406.166652][T12689] vhci_hcd: invalid port number 23 09:40:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, 0x0, 0x0) 09:40:23 executing program 0: read$usbmon(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600)='ethtool\x00', 0xffffffffffffffff) 09:40:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x123}) 09:40:23 executing program 4: socketpair(0x1, 0x0, 0x10001, &(0x7f0000000100)) 09:40:23 executing program 5: clock_gettime(0x3, &(0x7f0000000e80)) 09:40:24 executing program 3: r0 = socket(0x1, 0x3, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 09:40:24 executing program 1: socketpair(0x0, 0xf, 0x0, &(0x7f0000000000)) [ 407.051841][T12704] vhci_hcd: invalid port number 23 [ 407.057369][T12704] vhci_hcd: invalid port number 23 09:40:24 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, 0x0, 0x0) 09:40:24 executing program 4: connect$caif(0xffffffffffffffff, 0x0, 0x0) 09:40:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x201}) 09:40:24 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) 09:40:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00', r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 09:40:25 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xfffffffffffffffe, 0x4) [ 408.030836][T12719] usb usb9: usbfs: process 12719 (syz-executor.2) did not claim interface 23 before use 09:40:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000100)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x2, 0x9, 0x0, 0x5, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x4, 0x40000001, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0xf) timerfd_create(0x8, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000400)) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) socket(0x0, 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000005f40)={0x4, 0x4, [0xd35]}) 09:40:25 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000640)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 09:40:25 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) connect$caif(r0, &(0x7f0000000400)=@dbg, 0x18) 09:40:25 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x203}) 09:40:25 executing program 3: r0 = socket(0x1, 0x3, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000600)={&(0x7f0000000180), 0xc, &(0x7f00000005c0)={0x0}}, 0x0) 09:40:26 executing program 1: socket$inet(0x2, 0x803, 0x0) [ 408.788560][T12737] vhci_hcd: invalid port number 23 [ 408.794005][T12737] vhci_hcd: default hub control req: 0302 v0000 i0017 l0 09:40:26 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 09:40:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x105481) r1 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 09:40:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x300}) 09:40:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b0000000020201"], 0xb0}}, 0x0) 09:40:26 executing program 5: shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000480)={{0x3}}) 09:40:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000600)={'wg1\x00'}) 09:40:26 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600)='ethtool\x00', r1) 09:40:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x302}) [ 410.056331][T12756] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.3'. 09:40:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001f00), 0x10) 09:40:27 executing program 1: socketpair(0x18, 0x0, 0x8, &(0x7f0000000080)) 09:40:27 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) recvmmsg(r0, &(0x7f0000003180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2160, 0x0) 09:40:27 executing program 0: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x320, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x1}) 09:40:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@hoplimit_2292={{0x14}}, @rthdrdstopts={{0x18}}, @tclass={{0x14}}], 0x48}}], 0x1, 0x0) 09:40:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x320}) 09:40:28 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x4f00, 0x0) 09:40:28 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8003, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000c, 0x3071, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) munmap(&(0x7f0000ff9000/0x6000)=nil, 0x6000) sendmsg(0xffffffffffffffff, 0x0, 0x0) 09:40:28 executing program 0: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x320, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x1}) 09:40:28 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) [ 411.371209][T12783] vhci_hcd: invalid port number 23 09:40:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005cc0)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0, 0x0) 09:40:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x323}) 09:40:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 09:40:29 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)={{0x3}}) 09:40:29 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000900)='devlink\x00', r0) 09:40:29 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x84401, 0x0) [ 412.177854][T12797] vhci_hcd: invalid port number 23 [ 412.183098][T12797] vhci_hcd: invalid port number 23 09:40:29 executing program 5: socket(0x3, 0x0, 0xb125) 09:40:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x500}) 09:40:29 executing program 1: socketpair(0x10, 0x0, 0x0, &(0x7f00000001c0)) 09:40:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) 09:40:30 executing program 0: clone(0x154d300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000027c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x2000c500, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) rt_sigreturn() setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 09:40:30 executing program 4: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') r1 = gettid() write$FUSE_LK(r0, 0x0, 0x0) tkill(r1, 0x18) 09:40:30 executing program 5: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgrp(0x0) r1 = getpgrp(0x0) tgkill(r1, r0, 0x0) r2 = gettid() tkill(r2, 0x18) 09:40:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x600}) 09:40:30 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'user.', '\xbe--]].s/\':[P[(,-/(#$.,:#\'@\f--\x00'}, 0x0, 0x0) 09:40:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) 09:40:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x6, 0x101}, 0x14}}, 0x0) [ 413.891314][T12830] vhci_hcd: invalid port number 23 [ 413.896709][T12830] vhci_hcd: default hub control req: 0006 v0000 i0017 l0 09:40:31 executing program 5: memfd_create(&(0x7f00000000c0)='syztnl2\x00', 0x5) 09:40:31 executing program 4: pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_notify(r0, 0x0) 09:40:31 executing program 1: perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x8900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:40:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x700}) 09:40:31 executing program 0: clock_gettime(0x0, &(0x7f0000003180)) [ 414.509480][ T5] Bluetooth: hci4: command 0x0406 tx timeout 09:40:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001240)={0xa, 0x1ec4, 0x8, 0x3f}, 0x40) [ 414.740474][T12844] vhci_hcd: invalid port number 23 [ 414.745778][T12844] vhci_hcd: default hub control req: 0007 v0000 i0017 l0 09:40:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x44044) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000540)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, r1, 0x400, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CCA_MODE={0x8}]}, 0x2c}}, 0x20040800) 09:40:32 executing program 5: futex(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 09:40:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 09:40:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x900}) 09:40:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/4096, 0x2f, 0x1000, 0x1}, 0x20) 09:40:32 executing program 3: r0 = openat$vcsu(0xffffff9c, &(0x7f0000001c80)='/dev/vcsu\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 09:40:32 executing program 4: perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 415.576670][T12856] FAT-fs (loop1): bogus number of reserved sectors [ 415.583708][T12856] FAT-fs (loop1): Can't find a valid FAT filesystem 09:40:32 executing program 5: r0 = openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, 0x0, 0x0) 09:40:32 executing program 0: r0 = io_uring_setup(0x4ab2, &(0x7f0000001480)) openat$autofs(0xffffff9c, &(0x7f00000015c0)='/dev/autofs\x00', 0x202982, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000004, 0x12, r0, 0x0) syz_io_uring_setup(0x5860, &(0x7f0000001700), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001780), &(0x7f00000017c0)) [ 415.772146][T12856] FAT-fs (loop1): bogus number of reserved sectors [ 415.778998][T12856] FAT-fs (loop1): Can't find a valid FAT filesystem 09:40:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000040)='GPL\x00', 0x3, 0xb0, &(0x7f0000000080)=""/176, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:40:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x9b9}) 09:40:33 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18070000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x5, 0xc3072, 0xffffffffffffffff, 0x0) 09:40:33 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002b80)='ns/pid\x00') 09:40:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1c, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x9b, &(0x7f0000000100)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:40:33 executing program 0: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50242}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 416.651187][T12892] vhci_hcd: invalid port number 23 [ 416.656540][T12892] vhci_hcd: default hub control req: b909 v0000 i0017 l0 09:40:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x3, 0xb0, &(0x7f0000000080)=""/176, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:40:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xa00}) 09:40:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, 0x0) 09:40:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) [ 418.878265][ C1] clocksource: timekeeping watchdog on CPU1: Marking clocksource 'tsc' as unstable because the skew is too large: [ 418.890973][ C1] clocksource: 'acpi_pm' wd_now: 55cbbc wd_last: cca38b mask: ffffff [ 418.901662][ C1] clocksource: 'tsc' cs_now: e3aed4503b cs_last: e2569b00f8 mask: ffffffffffffffff [ 418.913381][ C1] tsc: Marking TSC unstable due to clocksource watchdog [ 419.027680][ T18] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 419.037512][ T18] sched_clock: Marking unstable (419230756099, -203061305)<-(419035441038, -7768117) [ 419.088539][T12907] clocksource: Switched to clocksource acpi_pm 09:40:36 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 419.413965][T12916] vhci_hcd: invalid port number 23 [ 419.419854][T12916] vhci_hcd: default hub control req: 000a v0000 i0017 l0 09:40:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x7}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x9b, &(0x7f0000000100)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:40:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={0x0}}, 0x0) 09:40:36 executing program 5: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001e00)='net/dev\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 09:40:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xb00}) 09:40:37 executing program 0: waitid(0x2, 0x0, 0x0, 0x1000006, 0x0) [ 419.908434][T12920] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 419.982734][T12922] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 09:40:37 executing program 3: r0 = openat$tun(0xffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) 09:40:37 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000005f00)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 09:40:37 executing program 1: r0 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000000)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x0) 09:40:37 executing program 0: r0 = getuid() syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000100)='?', 0x1, 0x6}, {0x0}, {&(0x7f00000002c0)="4cd400f95e34545ca2783a0212930f685fb66e049430e66f3fc769e1682c80a00e22892ba30e270ead08be", 0x2b, 0x8001}, {0x0}], 0x20000, &(0x7f0000000640)={[], [{@pcr={'pcr'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, '/dev/autofs\x00'}}, {@fowner_gt={'fowner>', r0}}]}) openat$autofs(0xffffff9c, 0x0, 0x18342, 0x0) 09:40:37 executing program 5: io_uring_setup(0x752d, &(0x7f00000006c0)={0x0, 0x0, 0x2, 0x0, 0x342}) 09:40:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xc00}) 09:40:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0xff, &(0x7f00000001c0)=""/255, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 421.278792][T12954] loop0: detected capacity change from 128 to 0 09:40:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0) r0 = io_uring_setup(0x4ab2, &(0x7f0000001480)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 09:40:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:40:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xc20}) 09:40:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 09:40:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, &(0x7f0000000200)={'syztnl1\x00', 0x0}) 09:40:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x0, 0x7b80719109cc4055, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 422.381289][T12993] vhci_hcd: invalid port number 23 [ 422.387175][T12993] vhci_hcd: SetHubDepth req not supported for USB 2.0 roothub 09:40:39 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0x3}) 09:40:39 executing program 4: r0 = openat$rtc(0xffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) 09:40:39 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000007440)='/dev/vsock\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500)={0x3}, 0x0, 0x0, &(0x7f0000000600)={0x0}) 09:40:39 executing program 5: shmat(0x0, &(0x7f0000ff7000/0x9000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x6000) 09:40:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xd00}) 09:40:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [0x0, 0xff], {0x0, 0x6, '$\x00@', 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, @loopback, [], "050c68deb1caadea"}}}}}}}, 0x0) 09:40:40 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80000) 09:40:40 executing program 0: mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x8, 0x1f, 0x0) 09:40:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2, 0x2a}, 0x40) [ 423.470216][T13012] vhci_hcd: invalid port number 23 [ 423.479295][T13012] vhci_hcd: default hub control req: 000d v0000 i0017 l0 09:40:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0x4030ae7b, 0x0) 09:40:40 executing program 3: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 09:40:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xe00}) 09:40:41 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) 09:40:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xae03, 0x0) 09:40:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xc0}, 0x0) [ 424.293241][T13030] vhci_hcd: invalid port number 23 [ 424.302052][T13030] vhci_hcd: default hub control req: 000e v0000 i0017 l0 09:40:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32], 0x50}, 0x0) 09:40:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xf00}) 09:40:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000200)={0x14, 0x14, 0x1, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 09:40:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 09:40:42 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x10, 0x14, 0x1}, 0x10}], 0x1}, 0x0) 09:40:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) 09:40:42 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x26cb}, 0xc) 09:40:42 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0xc0880) 09:40:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x1100}) 09:40:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0x4008ae6a, 0x0) 09:40:43 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x10, 0x14, 0x1}, 0x10}], 0x1}, 0x0) 09:40:43 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, 0x0, 0x0) [ 426.154426][T13068] vhci_hcd: invalid port number 23 [ 426.160167][T13068] vhci_hcd: default hub control req: 0011 v0000 i0017 l0 09:40:43 executing program 5: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:40:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, 0x0, 0x0) 09:40:43 executing program 1: openat$bsg(0xffffffffffffff9c, 0x0, 0x501503, 0x0) 09:40:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x1200}) 09:40:43 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x10, 0x14, 0x1}, 0x10}], 0x1}, 0x0) 09:40:43 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x10, 0x17, 0x1}, 0x10}], 0x1}, 0x0) 09:40:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0)='batadv\x00', r0) [ 427.014279][T13086] vhci_hcd: invalid port number 23 [ 427.019791][T13086] vhci_hcd: default hub control req: 0012 v0000 i0017 l0 09:40:44 executing program 3: socket(0x28, 0x0, 0x4) 09:40:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc008aeba, 0x0) 09:40:44 executing program 0: clock_gettime(0x7, &(0x7f0000001780)) 09:40:44 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x2000}) 09:40:44 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x10, 0x14, 0x1}, 0x10}], 0x1}, 0x0) 09:40:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, 0x0) [ 427.969874][T13101] vhci_hcd: invalid port number 23 [ 427.975271][T13101] vhci_hcd: default hub control req: 0020 v0000 i0017 l0 09:40:45 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f0000000400)='/dev/vcsu#\x00', 0x0, 0x0) 09:40:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="10"], 0x210}}, 0x0) 09:40:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, &(0x7f0000000000)=@xdp, 0x0, 0x0) 09:40:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x2001}) 09:40:45 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000007440)='/dev/vsock\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000004c0)={0x8}, 0x0, 0x0, 0x0, 0x0) 09:40:46 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000940), 0x8) signalfd4(r0, &(0x7f0000000d40), 0x8, 0x0) 09:40:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) [ 428.997888][T13130] usb usb9: usbfs: process 13130 (syz-executor.2) did not claim interface 23 before use 09:40:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc) 09:40:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x2003}) 09:40:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x4020940d, 0x0) 09:40:47 executing program 3: msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4) [ 429.945095][T13158] vhci_hcd: invalid port number 23 [ 429.950705][T13158] vhci_hcd: default hub control req: 0320 v0000 i0017 l0 09:40:47 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x6000) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x6000) 09:40:47 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 09:40:47 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x6000) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) 09:40:47 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}], 0x20}, 0x0) 09:40:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x200c}) 09:40:47 executing program 3: shmctl$IPC_SET(0x0, 0xc, 0x0) 09:40:47 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000240), &(0x7f00000002c0)={0xffffffff7fffffff}, &(0x7f0000000300)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340)={[0xfffffffffffffffa]}, 0x8}) 09:40:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf40000000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) [ 430.895512][T13174] vhci_hcd: invalid port number 23 [ 430.901158][T13174] vhci_hcd: default hub control req: 0c20 v0000 i0017 l0 09:40:48 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x4c, 0x12, 0x1, 0x0, 0x0, "", [@generic="0235b8bca384f05739a2e02d6a24db1d2aeec76b865a8576225b6260953b773710ffc952eefd0d992a0e5b4012c49ebfb88cb3135dc50b31bf"]}, 0x4c}], 0x1}, 0x0) 09:40:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 09:40:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x2301}) [ 431.344773][T13180] loop1: detected capacity change from 4096 to 0 [ 431.504516][T13187] usb usb9: usbfs: process 13187 (syz-executor.2) did not claim interface 23 before use 09:40:48 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x14, 0x14, 0x1, 0x0, 0x0, "", [@generic=',']}, 0x14}], 0x1}, 0x0) 09:40:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_test}) [ 431.603577][T13180] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 09:40:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x2303}) 09:40:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS(r0, 0x540e, 0x0) 09:40:49 executing program 4: shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x7000) mremap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 09:40:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5421, 0x4af000) [ 432.265415][T13199] vhci_hcd: invalid port number 23 [ 432.271154][T13199] vhci_hcd: default hub control req: 0323 v0000 i0017 l0 09:40:49 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, 0x0) 09:40:49 executing program 0: shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 09:40:49 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0)='gtp\x00', 0xffffffffffffffff) syz_open_dev$vcsu(0x0, 0x0, 0x0) 09:40:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x2500}) 09:40:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5450, 0x0) 09:40:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5421, 0x0) 09:40:50 executing program 3: shmat(0x0, &(0x7f0000ff7000/0x9000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x6000) 09:40:50 executing program 0: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/4096) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) [ 433.353634][T13215] vhci_hcd: invalid port number 23 [ 433.359140][T13215] vhci_hcd: default hub control req: 0025 v0000 i0017 l0 09:40:50 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x26cb}, 0xc) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001440)={0x0}}, 0x0) 09:40:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x4000}) 09:40:50 executing program 5: pselect6(0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0) 09:40:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8) sendmsg$netlink(r0, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000000040)={0xea4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xe91, 0x0, 0x0, 0x1, [@generic="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"]}]}, 0xea4}, {&(0x7f00000013c0)={0x10}, 0x10}, {&(0x7f0000001980)={0x10}, 0x10}], 0x3}, 0x0) 09:40:51 executing program 3: mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) msync(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x0) 09:40:51 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000002c0)={0xffffffff7fffffff}, 0x0, 0x0) [ 434.226859][T13232] vhci_hcd: invalid port number 23 [ 434.233895][T13232] vhci_hcd: default hub control req: 0040 v0000 i0017 l0 09:40:51 executing program 4: msync(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x500) 09:40:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x4800}) 09:40:51 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x9441695659ba4d7d, 0xffffffffffffffff, 0x0) 09:40:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000080)=""/139) 09:40:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fstat(r1, &(0x7f0000000300)) 09:40:52 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000002c0)={0xffffffff7fffffff}, 0x0, &(0x7f0000000380)={&(0x7f0000000340), 0x8}) [ 435.104270][T13246] vhci_hcd: invalid port number 23 [ 435.109668][T13246] vhci_hcd: default hub control req: 0048 v0000 i0017 l0 09:40:52 executing program 5: mremap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x1fffff, 0x0, &(0x7f0000fff000/0x1000)=nil) 09:40:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xae60, 0x0) 09:40:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x4c00}) 09:40:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) 09:40:52 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) 09:40:52 executing program 4: add_key$user(&(0x7f0000001140)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) [ 436.000848][T13263] vhci_hcd: invalid port number 23 [ 436.006191][T13263] vhci_hcd: default hub control req: 004c v0000 i0017 l0 09:40:53 executing program 5: mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1007, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ff7000/0x1000)=nil) 09:40:53 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000001cc0)={0x4c, 0x12, 0x1, 0x0, 0x0, "", [@generic="0a35b8bca384f05739a2e02d6a24db1d2aeec76b865a8576225b6260953b773710ffc952eefd0d992a0e5b4012c49ebfb88cb3135dc50b31bf"]}, 0x4c}], 0x1}, 0x0) 09:40:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x5c00}) 09:40:53 executing program 3: mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1007, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) mbind(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0x0, 0x0, 0x0) 09:40:53 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000a00), 0x8, 0x0) fdatasync(r0) 09:40:53 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) 09:40:54 executing program 5: shmat(0x0, &(0x7f0000ff7000/0x9000)=nil, 0x7000) sched_rr_get_interval(0x0, &(0x7f0000000c80)) [ 436.925356][T13284] vhci_hcd: invalid port number 23 [ 436.930836][T13284] vhci_hcd: default hub control req: 005c v0000 i0017 l0 09:40:54 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) shmctl$SHM_STAT_ANY(0x0, 0xf, 0x0) 09:40:54 executing program 3: mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) mremap(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) 09:40:54 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) 09:40:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x6000}) 09:40:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f"], 0x50}, 0x0) 09:40:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0x8030ae7c, 0x0) 09:40:55 executing program 1: socket(0x2c, 0x3, 0xffff) 09:40:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x300) 09:40:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x6800}) 09:40:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "6c3b11161c30cb8b209d4155afabadbb2185a6"}) 09:40:55 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000280)={0xffffff80}, 0x8) 09:40:55 executing program 5: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x2) [ 438.665380][T13319] vhci_hcd: invalid port number 23 [ 438.671177][T13319] vhci_hcd: default hub control req: 0068 v0000 i0017 l0 09:40:55 executing program 1: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 09:40:56 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000040), 0xc) 09:40:56 executing program 4: openat$vsock(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 09:40:56 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) syz_open_dev$vcsu(0x0, 0x0, 0x0) 09:40:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x6c00}) 09:40:56 executing program 5: setpriority(0x0, 0x0, 0x5) 09:40:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3}, 0x40) [ 439.577841][T13335] vhci_hcd: invalid port number 23 [ 439.583070][T13335] vhci_hcd: default hub control req: 006c v0000 i0017 l0 09:40:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x4, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', r0) 09:40:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc, 0xc) 09:40:57 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) 09:40:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x7400}) 09:40:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000000040)={0x10}, 0x10}, {0x0}, {&(0x7f0000001980)={0x10}, 0x10}], 0x3}, 0x0) [ 440.352442][T13350] vhci_hcd: invalid port number 23 [ 440.357940][T13350] vhci_hcd: default hub control req: 0074 v0000 i0017 l0 09:40:57 executing program 4: msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 09:40:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x38, 0x14, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x22, 0x1, "fdd12d401ccd00000000c972b5f7000000000000000000000000000000002ea5e15c29fe609a62c80ced8acefe9fa6d5dbd7e9405e2e1f322d3167b31986f5f85fb0440f54bcb8c85b964d53eec2fe8e5a7efe83c6f9f81b3fcb34865f8960041a5bdddb1100625867cf70c14f329e5afd6b2e9c481190163bb97cc33b179864f7f939add1754bbd1c537bc933c552901a451076e64db69199b49c7b861dd431e66146aedaa5347ff9683c5a48f602e442fdabb55aac4f6a7ea4c5f0c40f8cc4b32b249b9acb2ed3c9a91941829ebece543e6bc75abd8c24a1a1c381eab4487a9264b9e2ffca9eaa1750"}]}, 0xffffffffffffff8c}, 0x1, 0x0, 0x0, 0x4000010}, 0x14040800) 09:40:57 executing program 0: syz_open_dev$vcsu(&(0x7f0000000400)='/dev/vcsu#\x00', 0x0, 0x0) 09:40:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0x7a00}) 09:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d00)={&(0x7f0000000ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000c40)=""/167, 0x36, 0xa7, 0x1}, 0x20) 09:40:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000001e00)={&(0x7f0000001cc0), 0xc, &(0x7f0000001dc0)={0x0}}, 0x0) 09:40:58 executing program 4: perf_event_open(0x0, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='mm_page_alloc\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) 09:40:58 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="1000000014000100000000000000000086062e3b827fe8d0784555318cabadbe4f8c5878ba89961d7a9eebadbfc81814fd5456a00d26f300000000"], 0x10}], 0x1}, 0x0) 09:40:58 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4f1ab844}, &(0x7f00000002c0)={0xffffffff7fffffff}, &(0x7f0000000300)={0x77359400}, 0x0) 09:40:58 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x1fffff, 0x3, &(0x7f0000fff000/0x1000)=nil) 09:40:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xa100}) 09:40:58 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x6, 0x0, 0x0, 0xffffffffffffff9c) 09:40:59 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffff, 0x4000) [ 442.042135][T13370] ===================================================== [ 442.047006][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 442.047006][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Not tainted 5.11.0-rc7-syzkaller #0 [ 442.047006][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.047006][T13370] Call Trace: [ 442.047006][T13370] dump_stack+0x21c/0x280 [ 442.047006][T13370] kmsan_report+0xfb/0x1e0 [ 442.047006][T13370] __msan_warning+0x5f/0xa0 [ 442.047006][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 442.047006][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 442.047006][T13370] __vmalloc_node_range+0xc83/0x1310 [ 442.047006][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 442.047006][T13370] vzalloc+0xe0/0xf0 [ 442.047006][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.119984][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.128063][T13370] packet_set_ring+0x106c/0x45b0 [ 442.128063][T13370] ? aa_label_sk_perm+0x822/0x980 [ 442.128063][T13370] ? kmsan_get_metadata+0x116/0x180 [ 442.128063][T13370] ? _copy_from_user+0x1fd/0x300 [ 442.128063][T13370] packet_setsockopt+0x22a6/0x7910 [ 442.128063][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 442.128063][T13370] __sys_setsockopt+0x94c/0xd80 [ 442.128063][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 442.169747][T13370] __se_sys_setsockopt+0xdd/0x100 [ 442.169747][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 442.169747][T13370] __do_fast_syscall_32+0x102/0x160 [ 442.169747][T13370] do_fast_syscall_32+0x6a/0xc0 [ 442.169747][T13370] do_SYSENTER_32+0x73/0x90 [ 442.169747][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 442.169747][T13370] RIP: 0023:0xf7f66549 [ 442.169747][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 442.169747][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 442.169747][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 442.169747][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 442.169747][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 442.169747][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 442.169747][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 442.169747][T13370] [ 442.169747][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 442.169747][T13370] __bpf_prog_run32+0x84/0x190 [ 442.169747][T13370] __bpf_prog_run32+0x84/0x190 [ 442.169747][T13370] ===================================================== [ 442.169747][T13370] Disabling lock debugging due to kernel taint [ 442.308855][T13370] ===================================================== [ 442.315798][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 442.316990][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 442.316990][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.316990][T13370] Call Trace: [ 442.316990][T13370] dump_stack+0x21c/0x280 [ 442.316990][T13370] kmsan_report+0xfb/0x1e0 [ 442.316990][T13370] __msan_warning+0x5f/0xa0 [ 442.316990][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 442.316990][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 442.316990][T13370] __vmalloc_node_range+0xc83/0x1310 [ 442.316990][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 442.316990][T13370] vzalloc+0xe0/0xf0 [ 442.316990][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.316990][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.316990][T13370] packet_set_ring+0x106c/0x45b0 [ 442.316990][T13370] ? aa_label_sk_perm+0x822/0x980 [ 442.316990][T13370] ? kmsan_get_metadata+0x116/0x180 [ 442.316990][T13370] ? _copy_from_user+0x1fd/0x300 [ 442.316990][T13370] packet_setsockopt+0x22a6/0x7910 [ 442.316990][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 442.316990][T13370] __sys_setsockopt+0x94c/0xd80 [ 442.316990][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 442.316990][T13370] __se_sys_setsockopt+0xdd/0x100 [ 442.316990][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 442.316990][T13370] __do_fast_syscall_32+0x102/0x160 [ 442.316990][T13370] do_fast_syscall_32+0x6a/0xc0 [ 442.316990][T13370] do_SYSENTER_32+0x73/0x90 [ 442.316990][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 442.316990][T13370] RIP: 0023:0xf7f66549 [ 442.316990][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 442.316990][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 442.316990][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 442.316990][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 442.316990][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 442.316990][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 442.316990][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 442.316990][T13370] [ 442.316990][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 442.316990][T13370] __bpf_prog_run32+0x84/0x190 [ 442.316990][T13370] __bpf_prog_run32+0x84/0x190 [ 442.316990][T13370] ===================================================== [ 442.566306][T13370] ===================================================== [ 442.573239][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 442.580216][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 442.580216][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.580216][T13370] Call Trace: [ 442.580216][T13370] dump_stack+0x21c/0x280 [ 442.580216][T13370] kmsan_report+0xfb/0x1e0 [ 442.580216][T13370] __msan_warning+0x5f/0xa0 [ 442.580216][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 442.580216][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 442.580216][T13370] __vmalloc_node_range+0xc83/0x1310 [ 442.580216][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 442.580216][T13370] vzalloc+0xe0/0xf0 [ 442.580216][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.580216][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.580216][T13370] packet_set_ring+0x106c/0x45b0 [ 442.580216][T13370] ? aa_label_sk_perm+0x822/0x980 [ 442.580216][T13370] ? kmsan_get_metadata+0x116/0x180 [ 442.580216][T13370] ? _copy_from_user+0x1fd/0x300 [ 442.580216][T13370] packet_setsockopt+0x22a6/0x7910 [ 442.580216][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 442.580216][T13370] __sys_setsockopt+0x94c/0xd80 [ 442.580216][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 442.580216][T13370] __se_sys_setsockopt+0xdd/0x100 [ 442.580216][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 442.580216][T13370] __do_fast_syscall_32+0x102/0x160 [ 442.580216][T13370] do_fast_syscall_32+0x6a/0xc0 [ 442.580216][T13370] do_SYSENTER_32+0x73/0x90 [ 442.580216][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 442.580216][T13370] RIP: 0023:0xf7f66549 [ 442.580216][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 442.580216][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 442.580216][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 442.580216][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 442.580216][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 442.580216][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 442.580216][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 442.580216][T13370] [ 442.580216][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 442.580216][T13370] __bpf_prog_run32+0x84/0x190 [ 442.580216][T13370] __bpf_prog_run32+0x84/0x190 [ 442.580216][T13370] ===================================================== [ 442.823604][T13370] ===================================================== [ 442.830545][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 09:41:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5452, 0x0) [ 442.833556][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 442.833556][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.833556][T13370] Call Trace: [ 442.833556][T13370] dump_stack+0x21c/0x280 [ 442.833556][T13370] kmsan_report+0xfb/0x1e0 [ 442.833556][T13370] __msan_warning+0x5f/0xa0 [ 442.833556][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 442.833556][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 442.833556][T13370] __vmalloc_node_range+0xc83/0x1310 [ 442.833556][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 442.833556][T13370] vzalloc+0xe0/0xf0 [ 442.833556][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.833556][T13370] ? packet_set_ring+0x106c/0x45b0 [ 442.833556][T13370] packet_set_ring+0x106c/0x45b0 [ 442.833556][T13370] ? aa_label_sk_perm+0x822/0x980 [ 442.833556][T13370] ? kmsan_get_metadata+0x116/0x180 [ 442.833556][T13370] ? _copy_from_user+0x1fd/0x300 [ 442.833556][T13370] packet_setsockopt+0x22a6/0x7910 [ 442.833556][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 442.833556][T13370] __sys_setsockopt+0x94c/0xd80 [ 442.833556][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 442.833556][T13370] __se_sys_setsockopt+0xdd/0x100 [ 442.833556][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 442.833556][T13370] __do_fast_syscall_32+0x102/0x160 [ 442.833556][T13370] do_fast_syscall_32+0x6a/0xc0 [ 442.833556][T13370] do_SYSENTER_32+0x73/0x90 [ 442.833556][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 442.833556][T13370] RIP: 0023:0xf7f66549 09:41:00 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendmsg$netlink(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f00000054c0)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="1000000014000100000000000000000086062e3b827fe8d0784555318cabadbe4f8c5878ba89961d7a9eebadbfc81814fd5456a00d26f300000000"], 0x10}], 0x1}, 0x0) [ 442.833556][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 442.833556][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 442.833556][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 442.833556][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 442.833556][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 442.833556][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 442.833556][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 442.833556][T13370] [ 442.833556][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 442.833556][T13370] __bpf_prog_run32+0x84/0x190 [ 442.833556][T13370] __bpf_prog_run32+0x84/0x190 [ 442.833556][T13370] ===================================================== [ 443.081569][T13370] ===================================================== [ 443.088506][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 443.091862][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 443.091862][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.091862][T13370] Call Trace: [ 443.091862][T13370] dump_stack+0x21c/0x280 [ 443.091862][T13370] kmsan_report+0xfb/0x1e0 [ 443.091862][T13370] __msan_warning+0x5f/0xa0 [ 443.091862][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 443.091862][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 443.091862][T13370] __vmalloc_node_range+0xc83/0x1310 [ 443.091862][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 443.091862][T13370] vzalloc+0xe0/0xf0 [ 443.091862][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.091862][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.091862][T13370] packet_set_ring+0x106c/0x45b0 [ 443.091862][T13370] ? aa_label_sk_perm+0x822/0x980 [ 443.091862][T13370] ? kmsan_get_metadata+0x116/0x180 [ 443.091862][T13370] ? _copy_from_user+0x1fd/0x300 [ 443.091862][T13370] packet_setsockopt+0x22a6/0x7910 [ 443.091862][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 443.091862][T13370] __sys_setsockopt+0x94c/0xd80 [ 443.091862][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 443.091862][T13370] __se_sys_setsockopt+0xdd/0x100 [ 443.091862][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 443.091862][T13370] __do_fast_syscall_32+0x102/0x160 [ 443.091862][T13370] do_fast_syscall_32+0x6a/0xc0 [ 443.091862][T13370] do_SYSENTER_32+0x73/0x90 [ 443.091862][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 443.091862][T13370] RIP: 0023:0xf7f66549 [ 443.091862][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 443.091862][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 443.091862][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 443.091862][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 443.091862][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 443.091862][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 443.091862][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 443.091862][T13370] [ 443.091862][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 443.091862][T13370] __bpf_prog_run32+0x84/0x190 [ 443.091862][T13370] __bpf_prog_run32+0x84/0x190 [ 443.091862][T13370] ===================================================== [ 443.339734][T13370] ===================================================== [ 443.346664][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 443.349688][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 443.349688][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.374288][T13370] Call Trace: [ 443.374288][T13370] dump_stack+0x21c/0x280 [ 443.374288][T13370] kmsan_report+0xfb/0x1e0 [ 443.374288][T13370] __msan_warning+0x5f/0xa0 [ 443.374288][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 443.374288][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 443.374288][T13370] __vmalloc_node_range+0xc83/0x1310 [ 443.374288][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 443.374288][T13370] vzalloc+0xe0/0xf0 [ 443.374288][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.374288][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.374288][T13370] packet_set_ring+0x106c/0x45b0 [ 443.374288][T13370] ? aa_label_sk_perm+0x822/0x980 [ 443.374288][T13370] ? kmsan_get_metadata+0x116/0x180 [ 443.374288][T13370] ? _copy_from_user+0x1fd/0x300 [ 443.374288][T13370] packet_setsockopt+0x22a6/0x7910 [ 443.374288][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 443.374288][T13370] __sys_setsockopt+0x94c/0xd80 [ 443.374288][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 443.374288][T13370] __se_sys_setsockopt+0xdd/0x100 [ 443.374288][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 443.374288][T13370] __do_fast_syscall_32+0x102/0x160 [ 443.374288][T13370] do_fast_syscall_32+0x6a/0xc0 [ 443.374288][T13370] do_SYSENTER_32+0x73/0x90 [ 443.374288][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 443.374288][T13370] RIP: 0023:0xf7f66549 [ 443.374288][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 443.374288][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 443.374288][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 443.374288][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 443.374288][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 443.374288][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 443.374288][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 443.374288][T13370] [ 443.374288][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 443.374288][T13370] __bpf_prog_run32+0x84/0x190 [ 443.374288][T13370] __bpf_prog_run32+0x84/0x190 [ 443.374288][T13370] ===================================================== [ 443.597150][T13370] ===================================================== [ 443.604077][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 443.607113][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 443.622198][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.622198][T13370] Call Trace: [ 443.622198][T13370] dump_stack+0x21c/0x280 [ 443.622198][T13370] kmsan_report+0xfb/0x1e0 [ 443.622198][T13370] __msan_warning+0x5f/0xa0 [ 443.622198][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 443.622198][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 443.622198][T13370] __vmalloc_node_range+0xc83/0x1310 [ 443.622198][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 443.622198][T13370] vzalloc+0xe0/0xf0 [ 443.622198][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.622198][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.622198][T13370] packet_set_ring+0x106c/0x45b0 [ 443.622198][T13370] ? aa_label_sk_perm+0x822/0x980 [ 443.622198][T13370] ? kmsan_get_metadata+0x116/0x180 [ 443.622198][T13370] ? _copy_from_user+0x1fd/0x300 [ 443.622198][T13370] packet_setsockopt+0x22a6/0x7910 [ 443.622198][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 443.622198][T13370] __sys_setsockopt+0x94c/0xd80 [ 443.622198][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 443.622198][T13370] __se_sys_setsockopt+0xdd/0x100 [ 443.622198][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 443.622198][T13370] __do_fast_syscall_32+0x102/0x160 [ 443.622198][T13370] do_fast_syscall_32+0x6a/0xc0 [ 443.622198][T13370] do_SYSENTER_32+0x73/0x90 [ 443.622198][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 443.622198][T13370] RIP: 0023:0xf7f66549 [ 443.622198][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 443.622198][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 443.622198][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 443.622198][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 443.622198][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 443.622198][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 443.622198][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 443.622198][T13370] [ 443.622198][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 443.622198][T13370] __bpf_prog_run32+0x84/0x190 [ 443.622198][T13370] __bpf_prog_run32+0x84/0x190 [ 443.622198][T13370] ===================================================== [ 443.854491][T13370] ===================================================== [ 443.861420][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 443.864407][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 443.864407][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.864407][T13370] Call Trace: [ 443.864407][T13370] dump_stack+0x21c/0x280 [ 443.864407][T13370] kmsan_report+0xfb/0x1e0 [ 443.864407][T13370] __msan_warning+0x5f/0xa0 [ 443.864407][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 443.864407][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 443.864407][T13370] __vmalloc_node_range+0xc83/0x1310 [ 443.864407][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 443.864407][T13370] vzalloc+0xe0/0xf0 [ 443.864407][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.864407][T13370] ? packet_set_ring+0x106c/0x45b0 [ 443.864407][T13370] packet_set_ring+0x106c/0x45b0 [ 443.864407][T13370] ? aa_label_sk_perm+0x822/0x980 [ 443.864407][T13370] ? kmsan_get_metadata+0x116/0x180 [ 443.864407][T13370] ? _copy_from_user+0x1fd/0x300 [ 443.864407][T13370] packet_setsockopt+0x22a6/0x7910 [ 443.864407][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 443.864407][T13370] __sys_setsockopt+0x94c/0xd80 [ 443.864407][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 443.864407][T13370] __se_sys_setsockopt+0xdd/0x100 [ 443.864407][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 443.864407][T13370] __do_fast_syscall_32+0x102/0x160 [ 443.864407][T13370] do_fast_syscall_32+0x6a/0xc0 [ 443.864407][T13370] do_SYSENTER_32+0x73/0x90 [ 443.864407][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 443.864407][T13370] RIP: 0023:0xf7f66549 [ 443.864407][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 443.864407][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 443.864407][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 443.864407][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 443.864407][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 443.864407][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 443.864407][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 443.864407][T13370] [ 443.864407][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 443.864407][T13370] __bpf_prog_run32+0x84/0x190 [ 443.864407][T13370] __bpf_prog_run32+0x84/0x190 [ 443.864407][T13370] ===================================================== [ 444.111993][T13370] ===================================================== [ 444.118921][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 444.121945][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 444.121945][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.121945][T13370] Call Trace: [ 444.121945][T13370] dump_stack+0x21c/0x280 [ 444.121945][T13370] kmsan_report+0xfb/0x1e0 [ 444.121945][T13370] __msan_warning+0x5f/0xa0 [ 444.121945][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 444.121945][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 444.121945][T13370] __vmalloc_node_range+0xc83/0x1310 [ 444.121945][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 444.121945][T13370] vzalloc+0xe0/0xf0 [ 444.121945][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.121945][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.121945][T13370] packet_set_ring+0x106c/0x45b0 [ 444.121945][T13370] ? aa_label_sk_perm+0x822/0x980 [ 444.121945][T13370] ? kmsan_get_metadata+0x116/0x180 [ 444.121945][T13370] ? _copy_from_user+0x1fd/0x300 [ 444.121945][T13370] packet_setsockopt+0x22a6/0x7910 [ 444.121945][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 444.121945][T13370] __sys_setsockopt+0x94c/0xd80 [ 444.121945][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 444.121945][T13370] __se_sys_setsockopt+0xdd/0x100 [ 444.121945][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 444.121945][T13370] __do_fast_syscall_32+0x102/0x160 [ 444.121945][T13370] do_fast_syscall_32+0x6a/0xc0 [ 444.121945][T13370] do_SYSENTER_32+0x73/0x90 [ 444.121945][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 444.121945][T13370] RIP: 0023:0xf7f66549 [ 444.121945][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 444.121945][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 444.121945][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 444.121945][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 444.121945][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 444.121945][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 444.121945][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 444.121945][T13370] [ 444.121945][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 444.121945][T13370] __bpf_prog_run32+0x84/0x190 [ 444.121945][T13370] __bpf_prog_run32+0x84/0x190 [ 444.121945][T13370] ===================================================== [ 444.372804][T13370] ===================================================== [ 444.379798][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 444.382756][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 444.382756][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.382756][T13370] Call Trace: [ 444.382756][T13370] dump_stack+0x21c/0x280 [ 444.382756][T13370] kmsan_report+0xfb/0x1e0 [ 444.382756][T13370] __msan_warning+0x5f/0xa0 [ 444.382756][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 444.382756][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 444.382756][T13370] __vmalloc_node_range+0xc83/0x1310 [ 444.382756][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 444.382756][T13370] vzalloc+0xe0/0xf0 [ 444.382756][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.382756][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.382756][T13370] packet_set_ring+0x106c/0x45b0 [ 444.382756][T13370] ? aa_label_sk_perm+0x822/0x980 [ 444.382756][T13370] ? kmsan_get_metadata+0x116/0x180 [ 444.382756][T13370] ? _copy_from_user+0x1fd/0x300 [ 444.382756][T13370] packet_setsockopt+0x22a6/0x7910 [ 444.382756][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 444.382756][T13370] __sys_setsockopt+0x94c/0xd80 [ 444.382756][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 444.382756][T13370] __se_sys_setsockopt+0xdd/0x100 [ 444.382756][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 444.382756][T13370] __do_fast_syscall_32+0x102/0x160 [ 444.382756][T13370] do_fast_syscall_32+0x6a/0xc0 [ 444.382756][T13370] do_SYSENTER_32+0x73/0x90 [ 444.382756][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 444.382756][T13370] RIP: 0023:0xf7f66549 [ 444.382756][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 444.382756][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 444.382756][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 444.382756][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 444.382756][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 444.382756][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 444.382756][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 444.382756][T13370] [ 444.382756][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 444.382756][T13370] __bpf_prog_run32+0x84/0x190 [ 444.382756][T13370] __bpf_prog_run32+0x84/0x190 [ 444.382756][T13370] ===================================================== [ 444.632495][T13370] ===================================================== [ 444.639420][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 444.642449][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 444.642449][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.642449][T13370] Call Trace: [ 444.642449][T13370] dump_stack+0x21c/0x280 [ 444.642449][T13370] kmsan_report+0xfb/0x1e0 [ 444.642449][T13370] __msan_warning+0x5f/0xa0 [ 444.642449][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 444.642449][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 444.642449][T13370] __vmalloc_node_range+0xc83/0x1310 [ 444.642449][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 444.642449][T13370] vzalloc+0xe0/0xf0 [ 444.642449][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.642449][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.642449][T13370] packet_set_ring+0x106c/0x45b0 [ 444.642449][T13370] ? aa_label_sk_perm+0x822/0x980 [ 444.642449][T13370] ? kmsan_get_metadata+0x116/0x180 [ 444.642449][T13370] ? _copy_from_user+0x1fd/0x300 [ 444.642449][T13370] packet_setsockopt+0x22a6/0x7910 [ 444.642449][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 444.642449][T13370] __sys_setsockopt+0x94c/0xd80 [ 444.642449][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 444.642449][T13370] __se_sys_setsockopt+0xdd/0x100 [ 444.642449][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 444.642449][T13370] __do_fast_syscall_32+0x102/0x160 [ 444.642449][T13370] do_fast_syscall_32+0x6a/0xc0 [ 444.642449][T13370] do_SYSENTER_32+0x73/0x90 [ 444.642449][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 444.642449][T13370] RIP: 0023:0xf7f66549 [ 444.642449][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 444.642449][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 444.642449][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 444.642449][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 444.642449][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 444.642449][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 444.642449][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 444.642449][T13370] [ 444.642449][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 444.642449][T13370] __bpf_prog_run32+0x84/0x190 [ 444.642449][T13370] __bpf_prog_run32+0x84/0x190 [ 444.642449][T13370] ===================================================== [ 444.890717][T13370] ===================================================== [ 444.897649][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 444.900672][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 444.900672][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.900672][T13370] Call Trace: [ 444.900672][T13370] dump_stack+0x21c/0x280 [ 444.900672][T13370] kmsan_report+0xfb/0x1e0 [ 444.900672][T13370] __msan_warning+0x5f/0xa0 [ 444.900672][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 444.900672][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 444.900672][T13370] __vmalloc_node_range+0xc83/0x1310 [ 444.900672][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 444.900672][T13370] vzalloc+0xe0/0xf0 [ 444.900672][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.900672][T13370] ? packet_set_ring+0x106c/0x45b0 [ 444.900672][T13370] packet_set_ring+0x106c/0x45b0 [ 444.900672][T13370] ? aa_label_sk_perm+0x822/0x980 [ 444.900672][T13370] ? kmsan_get_metadata+0x116/0x180 [ 444.900672][T13370] ? _copy_from_user+0x1fd/0x300 [ 444.900672][T13370] packet_setsockopt+0x22a6/0x7910 [ 444.900672][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 444.900672][T13370] __sys_setsockopt+0x94c/0xd80 [ 444.900672][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 444.900672][T13370] __se_sys_setsockopt+0xdd/0x100 [ 444.900672][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 444.900672][T13370] __do_fast_syscall_32+0x102/0x160 [ 444.900672][T13370] do_fast_syscall_32+0x6a/0xc0 [ 444.900672][T13370] do_SYSENTER_32+0x73/0x90 [ 444.900672][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 444.900672][T13370] RIP: 0023:0xf7f66549 [ 444.900672][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 444.900672][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 444.900672][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 444.900672][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 444.900672][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 444.900672][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 444.900672][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 444.900672][T13370] [ 444.900672][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 444.900672][T13370] __bpf_prog_run32+0x84/0x190 [ 444.900672][T13370] __bpf_prog_run32+0x84/0x190 [ 444.900672][T13370] ===================================================== [ 445.148157][T13370] ===================================================== [ 445.155087][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 445.158107][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 445.158107][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.175466][T13370] Call Trace: [ 445.175466][T13370] dump_stack+0x21c/0x280 [ 445.187468][T13370] kmsan_report+0xfb/0x1e0 [ 445.187468][T13370] __msan_warning+0x5f/0xa0 [ 445.187468][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 445.187468][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 445.187468][T13370] __vmalloc_node_range+0xc83/0x1310 [ 445.187468][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 445.187468][T13370] vzalloc+0xe0/0xf0 [ 445.187468][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.187468][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.187468][T13370] packet_set_ring+0x106c/0x45b0 [ 445.187468][T13370] ? aa_label_sk_perm+0x822/0x980 [ 445.187468][T13370] ? kmsan_get_metadata+0x116/0x180 [ 445.187468][T13370] ? _copy_from_user+0x1fd/0x300 [ 445.187468][T13370] packet_setsockopt+0x22a6/0x7910 [ 445.187468][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 445.187468][T13370] __sys_setsockopt+0x94c/0xd80 [ 445.187468][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 445.187468][T13370] __se_sys_setsockopt+0xdd/0x100 [ 445.187468][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 445.187468][T13370] __do_fast_syscall_32+0x102/0x160 [ 445.187468][T13370] do_fast_syscall_32+0x6a/0xc0 [ 445.187468][T13370] do_SYSENTER_32+0x73/0x90 [ 445.187468][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 445.187468][T13370] RIP: 0023:0xf7f66549 [ 445.187468][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 445.187468][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 445.187468][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 445.187468][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 445.187468][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 445.187468][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 445.187468][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 445.187468][T13370] [ 445.187468][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 445.187468][T13370] __bpf_prog_run32+0x84/0x190 [ 445.187468][T13370] __bpf_prog_run32+0x84/0x190 [ 445.187468][T13370] ===================================================== [ 445.406217][T13370] ===================================================== [ 445.413150][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 445.416165][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 445.430591][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.430591][T13370] Call Trace: [ 445.430591][T13370] dump_stack+0x21c/0x280 [ 445.430591][T13370] kmsan_report+0xfb/0x1e0 [ 445.430591][T13370] __msan_warning+0x5f/0xa0 [ 445.430591][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 445.430591][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 445.430591][T13370] __vmalloc_node_range+0xc83/0x1310 [ 445.430591][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 445.430591][T13370] vzalloc+0xe0/0xf0 [ 445.430591][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.430591][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.430591][T13370] packet_set_ring+0x106c/0x45b0 [ 445.430591][T13370] ? aa_label_sk_perm+0x822/0x980 09:41:02 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001680)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 445.430591][T13370] ? kmsan_get_metadata+0x116/0x180 [ 445.430591][T13370] ? _copy_from_user+0x1fd/0x300 [ 445.430591][T13370] packet_setsockopt+0x22a6/0x7910 [ 445.430591][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 445.430591][T13370] __sys_setsockopt+0x94c/0xd80 [ 445.430591][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 445.430591][T13370] __se_sys_setsockopt+0xdd/0x100 [ 445.430591][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 445.430591][T13370] __do_fast_syscall_32+0x102/0x160 [ 445.430591][T13370] do_fast_syscall_32+0x6a/0xc0 [ 445.430591][T13370] do_SYSENTER_32+0x73/0x90 [ 445.430591][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 445.430591][T13370] RIP: 0023:0xf7f66549 [ 445.430591][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 445.430591][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 445.430591][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 445.430591][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 445.430591][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 445.430591][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 445.430591][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 445.430591][T13370] [ 445.430591][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 445.430591][T13370] __bpf_prog_run32+0x84/0x190 [ 445.430591][T13370] __bpf_prog_run32+0x84/0x190 [ 445.430591][T13370] ===================================================== [ 445.663728][T13370] ===================================================== [ 445.670658][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 445.673681][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 445.673681][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.673681][T13370] Call Trace: [ 445.673681][T13370] dump_stack+0x21c/0x280 [ 445.706624][T13370] kmsan_report+0xfb/0x1e0 [ 445.706624][T13370] __msan_warning+0x5f/0xa0 [ 445.706624][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 445.706624][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 445.725414][T13370] __vmalloc_node_range+0xc83/0x1310 [ 445.725414][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 445.725414][T13370] vzalloc+0xe0/0xf0 [ 445.725414][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.725414][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.725414][T13370] packet_set_ring+0x106c/0x45b0 [ 445.725414][T13370] ? aa_label_sk_perm+0x822/0x980 [ 445.725414][T13370] ? kmsan_get_metadata+0x116/0x180 [ 445.725414][T13370] ? _copy_from_user+0x1fd/0x300 [ 445.725414][T13370] packet_setsockopt+0x22a6/0x7910 [ 445.725414][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 445.725414][T13370] __sys_setsockopt+0x94c/0xd80 [ 445.725414][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 445.725414][T13370] __se_sys_setsockopt+0xdd/0x100 [ 445.725414][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 445.725414][T13370] __do_fast_syscall_32+0x102/0x160 [ 445.725414][T13370] do_fast_syscall_32+0x6a/0xc0 [ 445.725414][T13370] do_SYSENTER_32+0x73/0x90 [ 445.725414][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 445.725414][T13370] RIP: 0023:0xf7f66549 [ 445.725414][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 445.725414][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 445.725414][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 445.725414][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 445.725414][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 445.725414][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 445.725414][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 445.725414][T13370] [ 445.725414][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 445.725414][T13370] __bpf_prog_run32+0x84/0x190 [ 445.725414][T13370] __bpf_prog_run32+0x84/0x190 [ 445.725414][T13370] ===================================================== [ 445.921943][T13370] ===================================================== [ 445.928976][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 445.931898][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 445.931898][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.931898][T13370] Call Trace: [ 445.931898][T13370] dump_stack+0x21c/0x280 [ 445.931898][T13370] kmsan_report+0xfb/0x1e0 [ 445.931898][T13370] __msan_warning+0x5f/0xa0 [ 445.931898][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 445.931898][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 445.931898][T13370] __vmalloc_node_range+0xc83/0x1310 [ 445.931898][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 445.931898][T13370] vzalloc+0xe0/0xf0 [ 445.931898][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.931898][T13370] ? packet_set_ring+0x106c/0x45b0 [ 445.931898][T13370] packet_set_ring+0x106c/0x45b0 [ 445.931898][T13370] ? aa_label_sk_perm+0x822/0x980 [ 445.931898][T13370] ? kmsan_get_metadata+0x116/0x180 [ 445.931898][T13370] ? _copy_from_user+0x1fd/0x300 [ 445.931898][T13370] packet_setsockopt+0x22a6/0x7910 [ 445.931898][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 445.931898][T13370] __sys_setsockopt+0x94c/0xd80 [ 445.931898][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 445.931898][T13370] __se_sys_setsockopt+0xdd/0x100 [ 445.931898][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 445.931898][T13370] __do_fast_syscall_32+0x102/0x160 [ 445.931898][T13370] do_fast_syscall_32+0x6a/0xc0 [ 445.931898][T13370] do_SYSENTER_32+0x73/0x90 [ 445.931898][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 445.931898][T13370] RIP: 0023:0xf7f66549 [ 445.931898][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 445.931898][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 445.931898][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 445.931898][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 445.931898][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 445.931898][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 445.931898][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 445.931898][T13370] [ 445.931898][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 445.931898][T13370] __bpf_prog_run32+0x84/0x190 [ 445.931898][T13370] __bpf_prog_run32+0x84/0x190 [ 445.931898][T13370] ===================================================== [ 446.180148][T13370] ===================================================== [ 446.187101][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 446.190098][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 446.190098][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.190098][T13370] Call Trace: [ 446.190098][T13370] dump_stack+0x21c/0x280 [ 446.190098][T13370] kmsan_report+0xfb/0x1e0 [ 446.190098][T13370] __msan_warning+0x5f/0xa0 [ 446.190098][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 446.190098][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 446.190098][T13370] __vmalloc_node_range+0xc83/0x1310 [ 446.190098][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 446.190098][T13370] vzalloc+0xe0/0xf0 [ 446.190098][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.190098][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.190098][T13370] packet_set_ring+0x106c/0x45b0 [ 446.190098][T13370] ? aa_label_sk_perm+0x822/0x980 [ 446.190098][T13370] ? kmsan_get_metadata+0x116/0x180 [ 446.190098][T13370] ? _copy_from_user+0x1fd/0x300 [ 446.190098][T13370] packet_setsockopt+0x22a6/0x7910 [ 446.190098][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 446.190098][T13370] __sys_setsockopt+0x94c/0xd80 [ 446.190098][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 446.190098][T13370] __se_sys_setsockopt+0xdd/0x100 [ 446.190098][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 446.190098][T13370] __do_fast_syscall_32+0x102/0x160 [ 446.190098][T13370] do_fast_syscall_32+0x6a/0xc0 [ 446.190098][T13370] do_SYSENTER_32+0x73/0x90 [ 446.190098][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 446.190098][T13370] RIP: 0023:0xf7f66549 09:41:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0185500, &(0x7f0000000380)=@usbdevfs_connect={0xb909}) [ 446.190098][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 446.345339][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 446.345339][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 446.345339][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 446.345339][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 446.345339][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 446.345339][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 446.345339][T13370] [ 446.345339][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 446.345339][T13370] __bpf_prog_run32+0x84/0x190 [ 446.345339][T13370] __bpf_prog_run32+0x84/0x190 [ 446.345339][T13370] ===================================================== [ 446.437729][T13370] ===================================================== [ 446.446481][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 446.447684][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 446.447684][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.447684][T13370] Call Trace: [ 446.447684][T13370] dump_stack+0x21c/0x280 [ 446.447684][T13370] kmsan_report+0xfb/0x1e0 [ 446.447684][T13370] __msan_warning+0x5f/0xa0 [ 446.447684][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 446.447684][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 446.447684][T13370] __vmalloc_node_range+0xc83/0x1310 [ 446.447684][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 446.510439][T13370] vzalloc+0xe0/0xf0 [ 446.510439][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.510439][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.510439][T13370] packet_set_ring+0x106c/0x45b0 [ 446.510439][T13370] ? aa_label_sk_perm+0x822/0x980 [ 446.510439][T13370] ? kmsan_get_metadata+0x116/0x180 [ 446.510439][T13370] ? _copy_from_user+0x1fd/0x300 [ 446.510439][T13370] packet_setsockopt+0x22a6/0x7910 [ 446.510439][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 446.510439][T13370] __sys_setsockopt+0x94c/0xd80 [ 446.510439][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 446.510439][T13370] __se_sys_setsockopt+0xdd/0x100 [ 446.510439][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 446.510439][T13370] __do_fast_syscall_32+0x102/0x160 [ 446.510439][T13370] do_fast_syscall_32+0x6a/0xc0 [ 446.510439][T13370] do_SYSENTER_32+0x73/0x90 [ 446.510439][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 446.510439][T13370] RIP: 0023:0xf7f66549 [ 446.510439][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 446.510439][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 446.510439][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 446.510439][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 446.510439][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 446.510439][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 446.510439][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 446.510439][T13370] [ 446.510439][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 446.510439][T13370] __bpf_prog_run32+0x84/0x190 [ 446.510439][T13370] __bpf_prog_run32+0x84/0x190 [ 446.510439][T13370] ===================================================== [ 446.696821][T13370] ===================================================== [ 446.703745][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 446.706777][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 446.706777][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.706777][T13370] Call Trace: [ 446.706777][T13370] dump_stack+0x21c/0x280 [ 446.706777][T13370] kmsan_report+0xfb/0x1e0 [ 446.706777][T13370] __msan_warning+0x5f/0xa0 [ 446.706777][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 446.706777][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 446.706777][T13370] __vmalloc_node_range+0xc83/0x1310 [ 446.706777][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 446.706777][T13370] vzalloc+0xe0/0xf0 [ 446.706777][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.706777][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.706777][T13370] packet_set_ring+0x106c/0x45b0 [ 446.706777][T13370] ? aa_label_sk_perm+0x822/0x980 [ 446.706777][T13370] ? kmsan_get_metadata+0x116/0x180 [ 446.706777][T13370] ? _copy_from_user+0x1fd/0x300 [ 446.706777][T13370] packet_setsockopt+0x22a6/0x7910 [ 446.706777][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 446.706777][T13370] __sys_setsockopt+0x94c/0xd80 [ 446.706777][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 446.706777][T13370] __se_sys_setsockopt+0xdd/0x100 [ 446.706777][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 446.706777][T13370] __do_fast_syscall_32+0x102/0x160 [ 446.706777][T13370] do_fast_syscall_32+0x6a/0xc0 [ 446.706777][T13370] do_SYSENTER_32+0x73/0x90 [ 446.706777][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 446.706777][T13370] RIP: 0023:0xf7f66549 [ 446.706777][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 446.706777][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 446.706777][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 446.706777][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 446.706777][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 446.706777][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 446.706777][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 446.706777][T13370] [ 446.706777][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 446.706777][T13370] __bpf_prog_run32+0x84/0x190 [ 446.706777][T13370] __bpf_prog_run32+0x84/0x190 [ 446.706777][T13370] ===================================================== [ 446.954606][T13370] ===================================================== [ 446.961566][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 446.964555][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 446.964555][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.964555][T13370] Call Trace: [ 446.991888][T13370] dump_stack+0x21c/0x280 [ 446.991888][T13370] kmsan_report+0xfb/0x1e0 [ 446.991888][T13370] __msan_warning+0x5f/0xa0 [ 446.991888][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 446.991888][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 446.991888][T13370] __vmalloc_node_range+0xc83/0x1310 [ 446.991888][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 446.991888][T13370] vzalloc+0xe0/0xf0 [ 446.991888][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.991888][T13370] ? packet_set_ring+0x106c/0x45b0 [ 446.991888][T13370] packet_set_ring+0x106c/0x45b0 [ 446.991888][T13370] ? aa_label_sk_perm+0x822/0x980 [ 446.991888][T13370] ? kmsan_get_metadata+0x116/0x180 [ 446.991888][T13370] ? _copy_from_user+0x1fd/0x300 [ 446.991888][T13370] packet_setsockopt+0x22a6/0x7910 [ 446.991888][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 446.991888][T13370] __sys_setsockopt+0x94c/0xd80 [ 446.991888][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 446.991888][T13370] __se_sys_setsockopt+0xdd/0x100 [ 446.991888][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 446.991888][T13370] __do_fast_syscall_32+0x102/0x160 [ 446.991888][T13370] do_fast_syscall_32+0x6a/0xc0 [ 446.991888][T13370] do_SYSENTER_32+0x73/0x90 [ 446.991888][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 446.991888][T13370] RIP: 0023:0xf7f66549 [ 446.991888][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 446.991888][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 446.991888][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 446.991888][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 446.991888][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 446.991888][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 446.991888][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 446.991888][T13370] [ 446.991888][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 446.991888][T13370] __bpf_prog_run32+0x84/0x190 [ 446.991888][T13370] __bpf_prog_run32+0x84/0x190 [ 446.991888][T13370] ===================================================== [ 447.212245][T13370] ===================================================== [ 447.219176][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 447.222198][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 447.222198][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.222198][T13370] Call Trace: [ 447.222198][T13370] dump_stack+0x21c/0x280 [ 447.222198][T13370] kmsan_report+0xfb/0x1e0 [ 447.222198][T13370] __msan_warning+0x5f/0xa0 [ 447.222198][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 447.222198][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 447.222198][T13370] __vmalloc_node_range+0xc83/0x1310 [ 447.222198][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 447.222198][T13370] vzalloc+0xe0/0xf0 [ 447.222198][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.222198][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.222198][T13370] packet_set_ring+0x106c/0x45b0 [ 447.222198][T13370] ? aa_label_sk_perm+0x822/0x980 [ 447.222198][T13370] ? kmsan_get_metadata+0x116/0x180 [ 447.222198][T13370] ? _copy_from_user+0x1fd/0x300 [ 447.222198][T13370] packet_setsockopt+0x22a6/0x7910 [ 447.222198][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 447.222198][T13370] __sys_setsockopt+0x94c/0xd80 [ 447.222198][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 447.222198][T13370] __se_sys_setsockopt+0xdd/0x100 [ 447.222198][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 447.222198][T13370] __do_fast_syscall_32+0x102/0x160 [ 447.222198][T13370] do_fast_syscall_32+0x6a/0xc0 [ 447.222198][T13370] do_SYSENTER_32+0x73/0x90 [ 447.364519][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 447.364519][T13370] RIP: 0023:0xf7f66549 [ 447.364519][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 447.364519][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 447.364519][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 447.364519][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 447.364519][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 447.364519][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 447.364519][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 447.364519][T13370] [ 447.364519][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 447.364519][T13370] __bpf_prog_run32+0x84/0x190 [ 447.364519][T13370] __bpf_prog_run32+0x84/0x190 [ 447.364519][T13370] ===================================================== [ 447.469889][T13370] ===================================================== [ 447.476816][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 447.479844][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 447.488051][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.488051][T13370] Call Trace: [ 447.488051][T13370] dump_stack+0x21c/0x280 [ 447.488051][T13370] kmsan_report+0xfb/0x1e0 [ 447.488051][T13370] __msan_warning+0x5f/0xa0 [ 447.488051][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 447.488051][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 447.488051][T13370] __vmalloc_node_range+0xc83/0x1310 [ 447.488051][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 447.488051][T13370] vzalloc+0xe0/0xf0 [ 447.488051][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.488051][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.488051][T13370] packet_set_ring+0x106c/0x45b0 [ 447.488051][T13370] ? aa_label_sk_perm+0x822/0x980 [ 447.488051][T13370] ? kmsan_get_metadata+0x116/0x180 [ 447.488051][T13370] ? _copy_from_user+0x1fd/0x300 [ 447.488051][T13370] packet_setsockopt+0x22a6/0x7910 [ 447.488051][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 447.488051][T13370] __sys_setsockopt+0x94c/0xd80 [ 447.488051][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 447.488051][T13370] __se_sys_setsockopt+0xdd/0x100 [ 447.488051][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 447.488051][T13370] __do_fast_syscall_32+0x102/0x160 [ 447.488051][T13370] do_fast_syscall_32+0x6a/0xc0 [ 447.488051][T13370] do_SYSENTER_32+0x73/0x90 [ 447.488051][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 447.488051][T13370] RIP: 0023:0xf7f66549 [ 447.488051][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 447.488051][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 447.488051][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 447.488051][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 447.488051][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 447.488051][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 447.488051][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 447.488051][T13370] [ 447.488051][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 447.488051][T13370] __bpf_prog_run32+0x84/0x190 [ 447.488051][T13370] __bpf_prog_run32+0x84/0x190 [ 447.488051][T13370] ===================================================== [ 447.731305][T13370] ===================================================== [ 447.738317][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 447.741260][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 447.741260][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.763679][T13370] Call Trace: [ 447.763679][T13370] dump_stack+0x21c/0x280 [ 447.763679][T13370] kmsan_report+0xfb/0x1e0 [ 447.763679][T13370] __msan_warning+0x5f/0xa0 [ 447.763679][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 447.763679][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 447.763679][T13370] __vmalloc_node_range+0xc83/0x1310 [ 447.763679][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 447.763679][T13370] vzalloc+0xe0/0xf0 [ 447.763679][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.763679][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.763679][T13370] packet_set_ring+0x106c/0x45b0 [ 447.763679][T13370] ? aa_label_sk_perm+0x822/0x980 [ 447.763679][T13370] ? kmsan_get_metadata+0x116/0x180 [ 447.763679][T13370] ? _copy_from_user+0x1fd/0x300 [ 447.763679][T13370] packet_setsockopt+0x22a6/0x7910 [ 447.763679][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 447.763679][T13370] __sys_setsockopt+0x94c/0xd80 [ 447.763679][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 447.763679][T13370] __se_sys_setsockopt+0xdd/0x100 [ 447.763679][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 447.763679][T13370] __do_fast_syscall_32+0x102/0x160 [ 447.763679][T13370] do_fast_syscall_32+0x6a/0xc0 [ 447.763679][T13370] do_SYSENTER_32+0x73/0x90 [ 447.763679][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 447.763679][T13370] RIP: 0023:0xf7f66549 [ 447.763679][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 447.763679][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 447.763679][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 447.763679][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 447.763679][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 447.940621][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 447.940621][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 447.940621][T13370] [ 447.940621][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 447.940621][T13370] __bpf_prog_run32+0x84/0x190 [ 447.940621][T13370] __bpf_prog_run32+0x84/0x190 [ 447.940621][T13370] ===================================================== [ 447.989696][T13370] ===================================================== [ 447.996626][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 447.999643][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 447.999643][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.999643][T13370] Call Trace: [ 447.999643][T13370] dump_stack+0x21c/0x280 [ 447.999643][T13370] kmsan_report+0xfb/0x1e0 [ 447.999643][T13370] __msan_warning+0x5f/0xa0 [ 447.999643][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 447.999643][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 447.999643][T13370] __vmalloc_node_range+0xc83/0x1310 [ 447.999643][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 447.999643][T13370] vzalloc+0xe0/0xf0 [ 447.999643][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.999643][T13370] ? packet_set_ring+0x106c/0x45b0 [ 447.999643][T13370] packet_set_ring+0x106c/0x45b0 [ 447.999643][T13370] ? aa_label_sk_perm+0x822/0x980 [ 447.999643][T13370] ? kmsan_get_metadata+0x116/0x180 [ 447.999643][T13370] ? _copy_from_user+0x1fd/0x300 [ 447.999643][T13370] packet_setsockopt+0x22a6/0x7910 [ 447.999643][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 447.999643][T13370] __sys_setsockopt+0x94c/0xd80 [ 447.999643][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 447.999643][T13370] __se_sys_setsockopt+0xdd/0x100 [ 447.999643][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 447.999643][T13370] __do_fast_syscall_32+0x102/0x160 [ 447.999643][T13370] do_fast_syscall_32+0x6a/0xc0 [ 447.999643][T13370] do_SYSENTER_32+0x73/0x90 [ 447.999643][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 447.999643][T13370] RIP: 0023:0xf7f66549 [ 447.999643][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 447.999643][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 447.999643][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 447.999643][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 447.999643][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 447.999643][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 447.999643][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 447.999643][T13370] [ 447.999643][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 447.999643][T13370] __bpf_prog_run32+0x84/0x190 [ 447.999643][T13370] __bpf_prog_run32+0x84/0x190 [ 447.999643][T13370] ===================================================== [ 448.247695][T13370] ===================================================== [ 448.254622][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 448.259233][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 448.259233][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.259233][T13370] Call Trace: [ 448.259233][T13370] dump_stack+0x21c/0x280 [ 448.259233][T13370] kmsan_report+0xfb/0x1e0 [ 448.259233][T13370] __msan_warning+0x5f/0xa0 [ 448.259233][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 448.259233][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 448.259233][T13370] __vmalloc_node_range+0xc83/0x1310 [ 448.259233][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 448.259233][T13370] vzalloc+0xe0/0xf0 [ 448.259233][T13370] ? packet_set_ring+0x106c/0x45b0 [ 448.259233][T13370] ? packet_set_ring+0x106c/0x45b0 [ 448.259233][T13370] packet_set_ring+0x106c/0x45b0 [ 448.259233][T13370] ? aa_label_sk_perm+0x822/0x980 [ 448.259233][T13370] ? kmsan_get_metadata+0x116/0x180 [ 448.259233][T13370] ? _copy_from_user+0x1fd/0x300 [ 448.259233][T13370] packet_setsockopt+0x22a6/0x7910 [ 448.259233][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 448.259233][T13370] __sys_setsockopt+0x94c/0xd80 [ 448.259233][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 448.259233][T13370] __se_sys_setsockopt+0xdd/0x100 [ 448.259233][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 448.259233][T13370] __do_fast_syscall_32+0x102/0x160 [ 448.259233][T13370] do_fast_syscall_32+0x6a/0xc0 [ 448.259233][T13370] do_SYSENTER_32+0x73/0x90 [ 448.259233][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 448.259233][T13370] RIP: 0023:0xf7f66549 [ 448.259233][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 448.259233][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 448.259233][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 448.259233][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 448.259233][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 448.259233][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 448.259233][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 448.259233][T13370] [ 448.259233][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 448.259233][T13370] __bpf_prog_run32+0x84/0x190 [ 448.259233][T13370] __bpf_prog_run32+0x84/0x190 [ 448.259233][T13370] ===================================================== [ 448.505586][T13370] ===================================================== [ 448.512510][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 448.515539][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 448.515539][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.515539][T13370] Call Trace: [ 448.515539][T13370] dump_stack+0x21c/0x280 [ 448.515539][T13370] kmsan_report+0xfb/0x1e0 [ 448.515539][T13370] __msan_warning+0x5f/0xa0 [ 448.515539][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 448.515539][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 448.515539][T13370] __vmalloc_node_range+0xc83/0x1310 [ 448.515539][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 448.515539][T13370] vzalloc+0xe0/0xf0 [ 448.515539][T13370] ? packet_set_ring+0x106c/0x45b0 [ 448.515539][T13370] ? packet_set_ring+0x106c/0x45b0 [ 448.515539][T13370] packet_set_ring+0x106c/0x45b0 [ 448.515539][T13370] ? aa_label_sk_perm+0x822/0x980 [ 448.515539][T13370] ? kmsan_get_metadata+0x116/0x180 [ 448.515539][T13370] ? _copy_from_user+0x1fd/0x300 [ 448.611139][T13370] packet_setsockopt+0x22a6/0x7910 [ 448.611139][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 448.611139][T13370] __sys_setsockopt+0x94c/0xd80 [ 448.611139][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 448.611139][T13370] __se_sys_setsockopt+0xdd/0x100 [ 448.611139][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 448.611139][T13370] __do_fast_syscall_32+0x102/0x160 [ 448.611139][T13370] do_fast_syscall_32+0x6a/0xc0 [ 448.611139][T13370] do_SYSENTER_32+0x73/0x90 [ 448.611139][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 448.611139][T13370] RIP: 0023:0xf7f66549 [ 448.611139][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 448.611139][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 448.611139][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 448.611139][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 448.611139][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 448.611139][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 448.611139][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 448.611139][T13370] [ 448.611139][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 448.611139][T13370] __bpf_prog_run32+0x84/0x190 [ 448.611139][T13370] __bpf_prog_run32+0x84/0x190 [ 448.611139][T13370] ===================================================== [ 448.763812][T13370] ===================================================== [ 448.770743][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 448.773325][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 448.773759][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 448.773759][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.773759][T13370] Call Trace: [ 448.773759][T13370] dump_stack+0x21c/0x280 [ 448.773759][T13370] kmsan_report+0xfb/0x1e0 [ 448.773759][T13370] __msan_warning+0x5f/0xa0 [ 448.785428][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 [ 448.773759][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 448.773759][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 448.773759][T13370] __vmalloc_node_range+0xc83/0x1310 [ 448.773759][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 448.773759][T13370] vzalloc+0xe0/0xf0 [ 448.773759][T13370] ? packet_set_ring+0x106c/0x45b0 [ 448.773759][T13370] ? packet_set_ring+0x106c/0x45b0 [ 448.773759][T13370] packet_set_ring+0x106c/0x45b0 [ 448.773759][T13370] ? aa_label_sk_perm+0x822/0x980 [ 448.773759][T13370] ? kmsan_get_metadata+0x116/0x180 [ 448.773759][T13370] ? _copy_from_user+0x1fd/0x300 [ 448.773759][T13370] packet_setsockopt+0x22a6/0x7910 [ 448.773759][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 448.773759][T13370] __sys_setsockopt+0x94c/0xd80 [ 448.773759][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 448.773759][T13370] __se_sys_setsockopt+0xdd/0x100 [ 448.773759][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 448.773759][T13370] __do_fast_syscall_32+0x102/0x160 [ 448.773759][T13370] do_fast_syscall_32+0x6a/0xc0 [ 448.773759][T13370] do_SYSENTER_32+0x73/0x90 [ 448.773759][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 448.773759][T13370] RIP: 0023:0xf7f66549 [ 448.773759][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 448.773759][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 448.773759][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 448.773759][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 448.773759][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 448.773759][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 448.773759][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 448.773759][T13370] [ 448.773759][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 448.773759][T13370] __bpf_prog_run32+0x84/0x190 [ 448.773759][T13370] __bpf_prog_run32+0x84/0x190 [ 448.773759][T13370] ===================================================== [ 449.034333][T13370] ===================================================== [ 449.041266][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 449.044281][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 449.044281][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.044281][T13370] Call Trace: [ 449.044281][T13370] dump_stack+0x21c/0x280 [ 449.044281][T13370] kmsan_report+0xfb/0x1e0 [ 449.044281][T13370] __msan_warning+0x5f/0xa0 [ 449.044281][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 449.044281][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 449.044281][T13370] __vmalloc_node_range+0xc83/0x1310 [ 449.044281][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 449.044281][T13370] vzalloc+0xe0/0xf0 [ 449.044281][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.044281][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.044281][T13370] packet_set_ring+0x106c/0x45b0 [ 449.044281][T13370] ? aa_label_sk_perm+0x822/0x980 [ 449.044281][T13370] ? kmsan_get_metadata+0x116/0x180 [ 449.044281][T13370] ? _copy_from_user+0x1fd/0x300 [ 449.044281][T13370] packet_setsockopt+0x22a6/0x7910 [ 449.044281][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 449.044281][T13370] __sys_setsockopt+0x94c/0xd80 [ 449.044281][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 449.044281][T13370] __se_sys_setsockopt+0xdd/0x100 [ 449.044281][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 449.044281][T13370] __do_fast_syscall_32+0x102/0x160 [ 449.044281][T13370] do_fast_syscall_32+0x6a/0xc0 [ 449.044281][T13370] do_SYSENTER_32+0x73/0x90 [ 449.044281][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 449.044281][T13370] RIP: 0023:0xf7f66549 [ 449.044281][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 449.044281][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 449.044281][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 449.044281][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 449.044281][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 449.044281][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 449.044281][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 449.044281][T13370] [ 449.044281][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 449.044281][T13370] __bpf_prog_run32+0x84/0x190 [ 449.044281][T13370] __bpf_prog_run32+0x84/0x190 [ 449.044281][T13370] ===================================================== [ 449.293156][T13370] ===================================================== [ 449.300083][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 449.303108][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 449.303108][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.303108][T13370] Call Trace: [ 449.303108][T13370] dump_stack+0x21c/0x280 [ 449.303108][T13370] kmsan_report+0xfb/0x1e0 [ 449.303108][T13370] __msan_warning+0x5f/0xa0 [ 449.303108][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 449.303108][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 449.303108][T13370] __vmalloc_node_range+0xc83/0x1310 [ 449.303108][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 449.303108][T13370] vzalloc+0xe0/0xf0 [ 449.303108][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.303108][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.303108][T13370] packet_set_ring+0x106c/0x45b0 [ 449.303108][T13370] ? aa_label_sk_perm+0x822/0x980 [ 449.303108][T13370] ? kmsan_get_metadata+0x116/0x180 [ 449.303108][T13370] ? _copy_from_user+0x1fd/0x300 [ 449.303108][T13370] packet_setsockopt+0x22a6/0x7910 [ 449.303108][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 449.303108][T13370] __sys_setsockopt+0x94c/0xd80 [ 449.303108][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 449.303108][T13370] __se_sys_setsockopt+0xdd/0x100 [ 449.303108][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 449.303108][T13370] __do_fast_syscall_32+0x102/0x160 [ 449.303108][T13370] do_fast_syscall_32+0x6a/0xc0 [ 449.303108][T13370] do_SYSENTER_32+0x73/0x90 [ 449.303108][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 449.303108][T13370] RIP: 0023:0xf7f66549 [ 449.303108][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 449.303108][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 449.303108][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 449.303108][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 449.303108][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 449.303108][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 449.303108][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 449.303108][T13370] [ 449.303108][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 449.303108][T13370] __bpf_prog_run32+0x84/0x190 [ 449.303108][T13370] __bpf_prog_run32+0x84/0x190 [ 449.303108][T13370] ===================================================== [ 449.550222][T13370] ===================================================== [ 449.557174][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 449.561117][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 449.561117][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.561117][T13370] Call Trace: [ 449.561117][T13370] dump_stack+0x21c/0x280 [ 449.561117][T13370] kmsan_report+0xfb/0x1e0 [ 449.561117][T13370] __msan_warning+0x5f/0xa0 [ 449.561117][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 449.561117][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 449.561117][T13370] __vmalloc_node_range+0xc83/0x1310 [ 449.561117][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 449.561117][T13370] vzalloc+0xe0/0xf0 [ 449.561117][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.561117][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.561117][T13370] packet_set_ring+0x106c/0x45b0 [ 449.561117][T13370] ? aa_label_sk_perm+0x822/0x980 [ 449.561117][T13370] ? kmsan_get_metadata+0x116/0x180 [ 449.561117][T13370] ? _copy_from_user+0x1fd/0x300 [ 449.561117][T13370] packet_setsockopt+0x22a6/0x7910 [ 449.561117][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 449.561117][T13370] __sys_setsockopt+0x94c/0xd80 [ 449.561117][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 449.561117][T13370] __se_sys_setsockopt+0xdd/0x100 [ 449.561117][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 449.561117][T13370] __do_fast_syscall_32+0x102/0x160 [ 449.561117][T13370] do_fast_syscall_32+0x6a/0xc0 [ 449.561117][T13370] do_SYSENTER_32+0x73/0x90 [ 449.561117][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 449.561117][T13370] RIP: 0023:0xf7f66549 [ 449.561117][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 449.561117][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 449.561117][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 449.561117][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 449.561117][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 449.561117][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 449.561117][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 449.561117][T13370] [ 449.561117][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 449.561117][T13370] __bpf_prog_run32+0x84/0x190 [ 449.561117][T13370] __bpf_prog_run32+0x84/0x190 [ 449.561117][T13370] ===================================================== [ 449.808500][T13370] ===================================================== [ 449.815431][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 449.818449][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 449.818449][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.818449][T13370] Call Trace: [ 449.818449][T13370] dump_stack+0x21c/0x280 [ 449.818449][T13370] kmsan_report+0xfb/0x1e0 [ 449.818449][T13370] __msan_warning+0x5f/0xa0 [ 449.818449][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 449.818449][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 449.818449][T13370] __vmalloc_node_range+0xc83/0x1310 [ 449.818449][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 449.818449][T13370] vzalloc+0xe0/0xf0 [ 449.818449][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.818449][T13370] ? packet_set_ring+0x106c/0x45b0 [ 449.818449][T13370] packet_set_ring+0x106c/0x45b0 [ 449.818449][T13370] ? aa_label_sk_perm+0x822/0x980 [ 449.818449][T13370] ? kmsan_get_metadata+0x116/0x180 [ 449.818449][T13370] ? _copy_from_user+0x1fd/0x300 [ 449.818449][T13370] packet_setsockopt+0x22a6/0x7910 [ 449.818449][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 449.818449][T13370] __sys_setsockopt+0x94c/0xd80 [ 449.818449][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 449.818449][T13370] __se_sys_setsockopt+0xdd/0x100 [ 449.818449][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 449.818449][T13370] __do_fast_syscall_32+0x102/0x160 [ 449.818449][T13370] do_fast_syscall_32+0x6a/0xc0 [ 449.818449][T13370] do_SYSENTER_32+0x73/0x90 [ 449.818449][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 449.818449][T13370] RIP: 0023:0xf7f66549 [ 449.818449][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 449.818449][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 449.818449][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 449.818449][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 449.818449][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 449.818449][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 449.818449][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 449.818449][T13370] [ 449.818449][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 449.818449][T13370] __bpf_prog_run32+0x84/0x190 [ 449.818449][T13370] __bpf_prog_run32+0x84/0x190 [ 449.818449][T13370] ===================================================== [ 450.067513][T13370] ===================================================== [ 450.074446][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 450.077463][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 450.077463][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.077463][T13370] Call Trace: [ 450.077463][T13370] dump_stack+0x21c/0x280 [ 450.077463][T13370] kmsan_report+0xfb/0x1e0 [ 450.077463][T13370] __msan_warning+0x5f/0xa0 [ 450.077463][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 450.077463][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 450.077463][T13370] __vmalloc_node_range+0xc83/0x1310 [ 450.077463][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 450.077463][T13370] vzalloc+0xe0/0xf0 [ 450.077463][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.077463][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.077463][T13370] packet_set_ring+0x106c/0x45b0 [ 450.077463][T13370] ? aa_label_sk_perm+0x822/0x980 [ 450.077463][T13370] ? kmsan_get_metadata+0x116/0x180 [ 450.077463][T13370] ? _copy_from_user+0x1fd/0x300 [ 450.077463][T13370] packet_setsockopt+0x22a6/0x7910 [ 450.077463][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 450.077463][T13370] __sys_setsockopt+0x94c/0xd80 [ 450.077463][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 450.077463][T13370] __se_sys_setsockopt+0xdd/0x100 [ 450.077463][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 450.077463][T13370] __do_fast_syscall_32+0x102/0x160 [ 450.077463][T13370] do_fast_syscall_32+0x6a/0xc0 [ 450.077463][T13370] do_SYSENTER_32+0x73/0x90 [ 450.077463][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 450.077463][T13370] RIP: 0023:0xf7f66549 [ 450.077463][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 450.077463][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 450.077463][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 450.077463][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 450.077463][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 450.077463][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 450.077463][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 450.077463][T13370] [ 450.077463][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 450.077463][T13370] __bpf_prog_run32+0x84/0x190 [ 450.077463][T13370] __bpf_prog_run32+0x84/0x190 [ 450.077463][T13370] ===================================================== [ 450.327285][T13370] ===================================================== [ 450.334213][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 450.337237][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 450.337237][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.337237][T13370] Call Trace: [ 450.337237][T13370] dump_stack+0x21c/0x280 [ 450.337237][T13370] kmsan_report+0xfb/0x1e0 [ 450.337237][T13370] __msan_warning+0x5f/0xa0 [ 450.337237][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 450.337237][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 450.337237][T13370] __vmalloc_node_range+0xc83/0x1310 [ 450.337237][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 450.337237][T13370] vzalloc+0xe0/0xf0 [ 450.337237][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.337237][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.337237][T13370] packet_set_ring+0x106c/0x45b0 [ 450.337237][T13370] ? aa_label_sk_perm+0x822/0x980 [ 450.337237][T13370] ? kmsan_get_metadata+0x116/0x180 [ 450.337237][T13370] ? _copy_from_user+0x1fd/0x300 [ 450.337237][T13370] packet_setsockopt+0x22a6/0x7910 [ 450.337237][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 450.337237][T13370] __sys_setsockopt+0x94c/0xd80 [ 450.337237][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 450.337237][T13370] __se_sys_setsockopt+0xdd/0x100 [ 450.337237][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 450.337237][T13370] __do_fast_syscall_32+0x102/0x160 [ 450.337237][T13370] do_fast_syscall_32+0x6a/0xc0 [ 450.337237][T13370] do_SYSENTER_32+0x73/0x90 [ 450.337237][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 450.337237][T13370] RIP: 0023:0xf7f66549 [ 450.337237][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 450.337237][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 450.337237][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 450.337237][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 450.337237][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 450.337237][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 450.337237][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 450.337237][T13370] [ 450.337237][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 450.337237][T13370] __bpf_prog_run32+0x84/0x190 [ 450.337237][T13370] __bpf_prog_run32+0x84/0x190 [ 450.337237][T13370] ===================================================== [ 450.587666][T13370] ===================================================== [ 450.594598][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 450.597619][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 450.597619][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.597619][T13370] Call Trace: [ 450.597619][T13370] dump_stack+0x21c/0x280 [ 450.597619][T13370] kmsan_report+0xfb/0x1e0 [ 450.597619][T13370] __msan_warning+0x5f/0xa0 [ 450.597619][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 450.597619][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 450.597619][T13370] __vmalloc_node_range+0xc83/0x1310 [ 450.597619][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 450.597619][T13370] vzalloc+0xe0/0xf0 [ 450.597619][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.597619][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.597619][T13370] packet_set_ring+0x106c/0x45b0 [ 450.597619][T13370] ? aa_label_sk_perm+0x822/0x980 [ 450.597619][T13370] ? kmsan_get_metadata+0x116/0x180 [ 450.597619][T13370] ? _copy_from_user+0x1fd/0x300 [ 450.597619][T13370] packet_setsockopt+0x22a6/0x7910 [ 450.597619][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 450.597619][T13370] __sys_setsockopt+0x94c/0xd80 [ 450.597619][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 450.597619][T13370] __se_sys_setsockopt+0xdd/0x100 [ 450.597619][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 450.597619][T13370] __do_fast_syscall_32+0x102/0x160 [ 450.597619][T13370] do_fast_syscall_32+0x6a/0xc0 [ 450.597619][T13370] do_SYSENTER_32+0x73/0x90 [ 450.597619][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 450.597619][T13370] RIP: 0023:0xf7f66549 [ 450.597619][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 450.597619][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 450.597619][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 450.597619][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 450.597619][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 450.597619][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 450.597619][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 450.597619][T13370] [ 450.597619][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 450.597619][T13370] __bpf_prog_run32+0x84/0x190 [ 450.597619][T13370] __bpf_prog_run32+0x84/0x190 [ 450.597619][T13370] ===================================================== [ 450.848525][T13370] ===================================================== [ 450.855453][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 450.858475][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 450.858475][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.858475][T13370] Call Trace: [ 450.858475][T13370] dump_stack+0x21c/0x280 [ 450.858475][T13370] kmsan_report+0xfb/0x1e0 [ 450.858475][T13370] __msan_warning+0x5f/0xa0 [ 450.858475][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 450.858475][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 450.858475][T13370] __vmalloc_node_range+0xc83/0x1310 [ 450.858475][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 450.858475][T13370] vzalloc+0xe0/0xf0 [ 450.858475][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.858475][T13370] ? packet_set_ring+0x106c/0x45b0 [ 450.858475][T13370] packet_set_ring+0x106c/0x45b0 [ 450.858475][T13370] ? aa_label_sk_perm+0x822/0x980 [ 450.858475][T13370] ? kmsan_get_metadata+0x116/0x180 [ 450.858475][T13370] ? _copy_from_user+0x1fd/0x300 [ 450.858475][T13370] packet_setsockopt+0x22a6/0x7910 [ 450.858475][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 450.858475][T13370] __sys_setsockopt+0x94c/0xd80 [ 450.858475][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 450.858475][T13370] __se_sys_setsockopt+0xdd/0x100 [ 450.858475][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 450.858475][T13370] __do_fast_syscall_32+0x102/0x160 [ 450.858475][T13370] do_fast_syscall_32+0x6a/0xc0 [ 450.858475][T13370] do_SYSENTER_32+0x73/0x90 [ 450.858475][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 450.858475][T13370] RIP: 0023:0xf7f66549 [ 450.858475][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 450.858475][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 450.858475][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 450.858475][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 450.858475][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 450.858475][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 450.858475][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 450.858475][T13370] [ 450.858475][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 450.858475][T13370] __bpf_prog_run32+0x84/0x190 [ 450.858475][T13370] __bpf_prog_run32+0x84/0x190 [ 450.858475][T13370] ===================================================== [ 451.105619][T13370] ===================================================== [ 451.112554][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 451.115571][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 451.115571][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.115571][T13370] Call Trace: [ 451.115571][T13370] dump_stack+0x21c/0x280 [ 451.115571][T13370] kmsan_report+0xfb/0x1e0 [ 451.115571][T13370] __msan_warning+0x5f/0xa0 [ 451.115571][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 451.115571][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 451.115571][T13370] __vmalloc_node_range+0xc83/0x1310 [ 451.115571][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 451.115571][T13370] vzalloc+0xe0/0xf0 [ 451.115571][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.115571][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.115571][T13370] packet_set_ring+0x106c/0x45b0 [ 451.115571][T13370] ? aa_label_sk_perm+0x822/0x980 [ 451.115571][T13370] ? kmsan_get_metadata+0x116/0x180 [ 451.115571][T13370] ? _copy_from_user+0x1fd/0x300 [ 451.115571][T13370] packet_setsockopt+0x22a6/0x7910 [ 451.115571][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 451.115571][T13370] __sys_setsockopt+0x94c/0xd80 [ 451.115571][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 451.115571][T13370] __se_sys_setsockopt+0xdd/0x100 [ 451.115571][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 451.115571][T13370] __do_fast_syscall_32+0x102/0x160 [ 451.115571][T13370] do_fast_syscall_32+0x6a/0xc0 [ 451.115571][T13370] do_SYSENTER_32+0x73/0x90 [ 451.115571][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 451.115571][T13370] RIP: 0023:0xf7f66549 [ 451.115571][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 451.115571][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 451.115571][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 451.115571][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 451.115571][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 451.115571][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 451.115571][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 451.115571][T13370] [ 451.115571][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 451.115571][T13370] __bpf_prog_run32+0x84/0x190 [ 451.115571][T13370] __bpf_prog_run32+0x84/0x190 [ 451.115571][T13370] ===================================================== [ 451.367722][T13370] ===================================================== [ 451.374647][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 451.381890][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 451.381890][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.381890][T13370] Call Trace: [ 451.381890][T13370] dump_stack+0x21c/0x280 [ 451.381890][T13370] kmsan_report+0xfb/0x1e0 [ 451.381890][T13370] __msan_warning+0x5f/0xa0 [ 451.381890][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 451.381890][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 451.381890][T13370] __vmalloc_node_range+0xc83/0x1310 [ 451.381890][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 451.381890][T13370] vzalloc+0xe0/0xf0 [ 451.381890][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.381890][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.381890][T13370] packet_set_ring+0x106c/0x45b0 [ 451.381890][T13370] ? aa_label_sk_perm+0x822/0x980 [ 451.381890][T13370] ? kmsan_get_metadata+0x116/0x180 [ 451.381890][T13370] ? _copy_from_user+0x1fd/0x300 [ 451.381890][T13370] packet_setsockopt+0x22a6/0x7910 [ 451.381890][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 451.381890][T13370] __sys_setsockopt+0x94c/0xd80 [ 451.381890][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 451.381890][T13370] __se_sys_setsockopt+0xdd/0x100 [ 451.381890][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 451.381890][T13370] __do_fast_syscall_32+0x102/0x160 [ 451.381890][T13370] do_fast_syscall_32+0x6a/0xc0 [ 451.381890][T13370] do_SYSENTER_32+0x73/0x90 [ 451.381890][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 451.381890][T13370] RIP: 0023:0xf7f66549 [ 451.381890][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 451.381890][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 451.381890][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 451.381890][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 451.381890][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 451.381890][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 451.381890][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 451.381890][T13370] [ 451.381890][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 451.381890][T13370] __bpf_prog_run32+0x84/0x190 [ 451.381890][T13370] __bpf_prog_run32+0x84/0x190 [ 451.381890][T13370] ===================================================== [ 451.630393][T13370] ===================================================== [ 451.638894][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 451.646117][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 451.646117][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.646117][T13370] Call Trace: [ 451.646117][T13370] dump_stack+0x21c/0x280 [ 451.646117][T13370] kmsan_report+0xfb/0x1e0 [ 451.646117][T13370] __msan_warning+0x5f/0xa0 [ 451.646117][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 451.646117][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 451.646117][T13370] __vmalloc_node_range+0xc83/0x1310 [ 451.646117][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 451.646117][T13370] vzalloc+0xe0/0xf0 [ 451.646117][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.646117][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.646117][T13370] packet_set_ring+0x106c/0x45b0 [ 451.646117][T13370] ? aa_label_sk_perm+0x822/0x980 [ 451.646117][T13370] ? kmsan_get_metadata+0x116/0x180 [ 451.646117][T13370] ? _copy_from_user+0x1fd/0x300 [ 451.646117][T13370] packet_setsockopt+0x22a6/0x7910 [ 451.646117][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 451.646117][T13370] __sys_setsockopt+0x94c/0xd80 [ 451.646117][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 451.646117][T13370] __se_sys_setsockopt+0xdd/0x100 [ 451.646117][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 451.646117][T13370] __do_fast_syscall_32+0x102/0x160 [ 451.646117][T13370] do_fast_syscall_32+0x6a/0xc0 [ 451.646117][T13370] do_SYSENTER_32+0x73/0x90 [ 451.646117][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 451.646117][T13370] RIP: 0023:0xf7f66549 [ 451.646117][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 451.646117][T13370] RSP: 002b:00000000f55605fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 451.646117][T13370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000107 [ 451.646117][T13370] RDX: 000000000000000d RSI: 0000000020000040 RDI: 000000000000001c [ 451.646117][T13370] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 451.646117][T13370] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 451.646117][T13370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 451.646117][T13370] [ 451.646117][T13370] Local variable ----regs@__bpf_prog_run32 created at: [ 451.646117][T13370] __bpf_prog_run32+0x84/0x190 [ 451.646117][T13370] __bpf_prog_run32+0x84/0x190 [ 451.646117][T13370] ===================================================== [ 451.893484][T13370] ===================================================== [ 451.900410][T13370] BUG: KMSAN: uninit-value in __map_kernel_range_noflush+0xae4/0x11d0 [ 451.903440][T13370] CPU: 0 PID: 13370 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 451.903440][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.903440][T13370] Call Trace: [ 451.903440][T13370] dump_stack+0x21c/0x280 [ 451.903440][T13370] kmsan_report+0xfb/0x1e0 [ 451.903440][T13370] __msan_warning+0x5f/0xa0 [ 451.903440][T13370] __map_kernel_range_noflush+0xae4/0x11d0 [ 451.903440][T13370] kmsan_map_kernel_range_noflush+0x1b4/0x210 [ 451.903440][T13370] __vmalloc_node_range+0xc83/0x1310 [ 451.903440][T13370] ? packet_set_ring+0xfd0/0x45b0 [ 451.903440][T13370] vzalloc+0xe0/0xf0 [ 451.903440][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.903440][T13370] ? packet_set_ring+0x106c/0x45b0 [ 451.903440][T13370] packet_set_ring+0x106c/0x45b0 [ 451.903440][T13370] ? aa_label_sk_perm+0x822/0x980 [ 451.903440][T13370] ? kmsan_get_metadata+0x116/0x180 [ 451.903440][T13370] ? _copy_from_user+0x1fd/0x300 [ 451.903440][T13370] packet_setsockopt+0x22a6/0x7910 [ 451.903440][T13370] ? aa_sock_opt_perm+0x156/0x2a0 [ 451.903440][T13370] __sys_setsockopt+0x94c/0xd80 [ 451.903440][T13370] ? packet_ioctl+0x4c0/0x4c0 [ 451.903440][T13370] __se_sys_setsockopt+0xdd/0x100 [ 451.903440][T13370] __ia32_sys_setsockopt+0x62/0x80 [ 451.903440][T13370] __do_fast_syscall_32+0x102/0x160 [ 451.903440][T13370] do_fast_syscall_32+0x6a/0xc0 [ 451.903440][T13370] do_SYSENTER_32+0x73/0x90 [ 451.903440][T13370] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 451.903440][T13370] RIP: 0023:0xf7f66549 [ 451.903440][T13370] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00