80)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\r~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) [ 1351.591391][T12642] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000053900"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyr\xa5\xc4\xee*', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000500000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031df06d028511cfed23200a0009000100061d85680c1baba2", 0x20}], 0x30d}, 0x0) r1 = socket(0x14, 0x806, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) r2 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r2, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r3, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r4 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x100000000, 0x200000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_netdev_private(r5, 0x89f5, &(0x7f0000000280)="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") setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000240)=0xb987, 0x4) sendmsg$can_bcm(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x5, 0x9, 0x9, {}, {}, {0x4, 0x400, 0x0, 0x1}, 0x1, @canfd={{0x1, 0xffffffffffffff01, 0x1, 0x9}, 0x0, 0x0, 0x0, 0x0, "2dc3785fa0e155883491fd5caf3fc564b9526e4076901d7ae8e96c5ec4beb33157270a1adf8521825bf14a29e184eba7b81087d9c6a0dfbff1db14c401c56f5b"}}, 0x80}, 0x1, 0x0, 0x0, 0x1000}, 0x2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) 00:24:23 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x0e~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) [ 1351.880796][T12672] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1351.933792][T12672] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1351.946737][T12672] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) r3 = request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\x00', r2) keyctl$setperm(0x5, r3, 0x3a0000) 00:24:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1351.994769][T12672] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000055a00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:23 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x0f~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000600000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1352.183391][T12694] encrypted_key: insufficient parameters specified 00:24:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) fcntl$getown(r0, 0x9) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") r3 = dup(0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x9, &(0x7f0000000140)=0x6, 0x4) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0xc000) syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) socket(0x10, 0x3, 0x4) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) accept4$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80000) [ 1352.267713][T12699] encrypted_key: insufficient parameters specified 00:24:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:23 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x10~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) [ 1352.367295][T12709] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1352.403216][T12709] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000700000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000055b00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:23 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x5) setsockopt$inet6_tcp_buf(r0, 0x6, 0x74112e2c2dadd73e, &(0x7f00000000c0)="57f05da7deef4d6abd6afba12f81f994ee247c0514c459995d3cb9eb25a3704a732fb99cc88914c547b9cf03a6a332f26faddee0a03cec937dc4af5c0635464f4590ead3c9c00ac177111865caff6b8037511560d78c8313e928170330a4afc7eef4ffb56eb70f4e60eab80fa784a13c37e04bde68066f765ee1ec47c08fb759a8c693e85995c76235ca339ef48b3432a15e1cba7c154820abb0c004254507a8cae0290596", 0xa5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000001c0)=0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)={0x16, 0x6f, 0x2, {0x1, [{0x40, 0x3, 0x2}]}}, 0x16) r3 = socket(0x10, 0x3, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x5, 0x0, 0x4000a, {0x1000007}}, 0xfffffffffffffe0f) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) write(r3, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x12~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005370300"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x2, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:24 executing program 4: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000a00)='rxrpc\x00', &(0x7f0000000200)={'\xf3\xfd\x00', 0x3}, 0x0, 0x12d, r3) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'sy\xf8'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000340)="a6cb1ea31d1d8df3845fd434635440c50a5fdcb9388e91ff0c3108c5fd368d8f04c693a25090d925cbca098cf0447b489fef2656ebae102d8c747265bb4315a35cf7", 0x42, 0x3e4}], 0x41000, &(0x7f0000000800)=ANY=[@ANYBLOB='overriderockperm,check=relaxed,fowner>', @ANYRESDEC=r6, @ANYBLOB="2c61707072616973655f747970653d696d617369672c00dd4d6db529772eb7106994686fe6cc844ea9c79836da03b77d82c851c37c7488e22003bb263bfc8687f97f2a2f1abd7fad16b0faad1d66db3b5d36b0389b31a86bd9193c835526f5df8645284cd632dbd8070daf497e792c96a1dfd58d6c011600bdfeca31ded65c51d39aeb0512ce077cc85b808bb77eacc1e8617fd2a7770f156f08f61c00d0eccff2c9ad4f01919bdc37acce1166fec5b2fae03509ddbdcb64a7d442a3f7"]) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x111000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000580), &(0x7f00000005c0)=0x8) keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000404}, 0xc, &(0x7f0000000680)={&(0x7f0000000740)={0x64, r8, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) keyctl$link(0x8, r4, r5) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r9 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r9, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r10 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r11 = socket$inet6(0xa, 0x0, 0x8010000000000084) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r11, 0x84, 0x1, &(0x7f0000000000)={r13}, 0x14) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r14, 0x6612) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r14, 0x84, 0x73, &(0x7f0000002640)={0x0, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r16 = socket$inet6(0xa, 0x0, 0x8010000000000084) r17 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r17, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r16, 0x84, 0x1, &(0x7f0000000000)={r18}, 0x14) sendmsg$inet_sctp(r10, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r13, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r15, @ANYBLOB="00000000000000008400000002000000060000800500000000000000", @ANYRES32=r18], 0xf8, 0x40000}, 0x4000) setsockopt$inet_sctp6_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000900)=@assoc_id=r13, 0x4) r19 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x28400) getsockopt$inet_sctp_SCTP_NODELAY(r19, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) 00:24:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000a00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x13~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1352.909407][T12745] encrypted_key: insufficient parameters specified 00:24:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005ffffffffffffffff0000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x14~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x2f9, &(0x7f0000000180)}, 0x48000) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 00:24:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000d00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1353.255319][T12745] encrypted_key: insufficient parameters specified 00:24:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x15~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070200"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)={'exec ', ':chain\x00'}, 0xc) 00:24:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000e00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x16~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x18001, 0x2) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070300"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='cifs.idmap\x00', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x101000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000280)=0x4) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000140)={0x5, 0x3, 0x2, 'queue0\x00', 0x8}) 00:24:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095e60e00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:25 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x17~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9, 0x8010, r1, 0x80000000) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) r3 = request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='\xa7.wlan0\\wlan0\x00', r2) add_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="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", 0xfd, r3) 00:24:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000f00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:25 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, 0xffffffffffffffff}, 0x10) 00:24:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_proto_private(r1, 0x89ee, &(0x7f00000000c0)="4b82e68dfc346b382da4ed9f7c3fa62674f3c4dbc069f5655e8957e1c2562f683d96d1113b405fc97bfcb020a28a59b0d8e3e74425dea3cf3b201e33357654c254f94a9efa3d8b1b1c03cca0a59f3760252d6d29ad97be7d5fc05fc331fea7d03148e2de18b7e087b4ab8b91454f2b52b2f798d265fae1c50442d51cc29d008957dd96eb269ee14751c73b24bebdce799270a1aa7474f478") ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) [ 1354.192744][T12843] encrypted_key: insufficient parameters specified 00:24:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070500"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1354.279170][T12848] encrypted_key: insufficient parameters specified 00:24:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_proto_private(r1, 0x89ef, &(0x7f0000000080)="423836b418a2f6fdcc393b3db5b11f2511abb32ba113027391047e98c4") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180), 0x1}, 0x0) socket(0x10, 0x3, 0x0) mq_unlink(&(0x7f00000000c0)='selinux.\x00') 00:24:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$revoke(0x3, r2) 00:24:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001100000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:25 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, 0xffffffffffffffff}, 0x10) 00:24:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070600"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1354.514183][T12869] encrypted_key: insufficient parameters specified [ 1354.560296][T12869] encrypted_key: insufficient parameters specified 00:24:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001400000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:26 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008911, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0xfffffffffffffc2c, &(0x7f0000000140)=[{&(0x7f00000001c0)="f884dcc35825cf01774cca76c755119164b213224e3970942e3bb31b614c98a4ab62bfe41488136e545a76d9187945fd01b5d535a7ddc91c010f48a404842f05314a773fcce9e389c6b5c14a667c49bfe31971dfbb704eb2970ada80b5cf8bd3aac12ef5c55258d49e10a4b96b6d0903576300100000000000009e493cf6717f930deaba9f2b8cbf6caebe0fa03b85fda817e739ce101ab6375450c78f8b878960000000000000000000"}], 0x1000000000000019}, 0x24004000) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x445, &(0x7f0000000000)=[{}]}, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000100)={0x0, @speck128, 0x0, "c5e3ff5526f5d789"}) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:26 executing program 4: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'\x00\x03\x01'}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r3}, 0x10) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f00000001c0)={'tunl0\x00', 0x400}) 00:24:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, 0xffffffffffffffff}, 0x10) [ 1354.811063][T12889] encrypted_key: insufficient parameters specified 00:24:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x108000, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x3ff, 0x2, 0x3}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) [ 1354.855952][T12889] encrypted_key: insufficient parameters specified 00:24:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001500000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'\x00', 0x1}, 0x0, 0x0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c0000001600010000000000000000000a000000", @ANYRES32, @ANYBLOB="14000200ff011e0047f000000500000000000000462b36a6af5a348ad4bd6cdcb5e371554d9d3acd2cee33e2c6f65da9276e646443628620525aad1fd8bd6d1af013041c73bdfa0010eb8b7e7bdc849905369e2a9021d5413475812e714453ccdae859d600a655ef856cfe133c8bc08e8588332921a8b1bee2af7597a7d549c7bff46f5e8cc0ddc4e23828a63a05bbf83c5e4f5e6707bf82ef087756e2cd567179cc1aed8b37c31194a5dce2354e40b04ae018b9bfa1bd60091ad8c493da1baeb0d2ef2f07fceae201cfe04576d552956f8242e8697d94b359ec43b6747324287739c5187768115ae0a0e066fb0b1a30"], 0x2c}}, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000006c0)='cifs.idmap\x00', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070700"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, 0xffffffffffffffff}, 0x10) 00:24:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000080)={0x5, {0xde, 0x4, 0x2, 0x10000}, {0x9, 0x6, 0x3, 0x7fffffff}, {0x4c5, 0xfffffffffffffffc}}) 00:24:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, 0xffffffffffffffff}, 0x10) 00:24:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070800"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001600000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:26 executing program 4: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000140)={{0x8000, 0xc93}, 'port0\x00', 0xa0, 0x10002, 0x80000000, 0x6, 0x8758, 0x1, 0xce, 0x0, 0x1, 0x7fffffff}) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200040) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, 0xffffffffffffffff}, 0x10) 00:24:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001800000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x100, 0x2000) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000400), &(0x7f0000000440)=0x4) r8 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="10dcd687301ce319c585f305308fe208000000", @ANYRES32=r8, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x5c, 0x1) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={r6, r7, r8}, 0xc) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000200)={0xa0, 0x0, 0x7, {{0x6, 0x1, 0x7, 0x5, 0x1c4000000000, 0xfffffffffffffffd, {0x4, 0x8, 0xff, 0x800, 0x100000000000, 0x1, 0x80, 0x7, 0x407, 0x8, 0x6bb01758, r7, r9, 0x93, 0x7fffffff}}}}, 0xa0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070900"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, 0xffffffffffffffff}, 0x10) 00:24:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@hci, &(0x7f0000000100)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x22000108}, 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB="24c6ed7bd3a03d4a9b5712444b03b9b923b807f11ec486f08ceb02ce14782903af4ffba9dfa4b784092f031a941c8431bc661c5f45b37854d0d22c1350378538f10054ab0f016b6d642e6e52efcaadbb00d8a67020d8c2b161d1abb86cb9984e6afd06c2ade996da263f3cc01b8f2f3fdd541dcf1e87751e4d5645103ad6416203e8913076d07085acfb9fb33c7c91321a9d9f3c81f276802cfec2ed9e0ea735cce1e3f3e0199f40a3a0e2efcfa93bec873c995b49734b697d395b5737aae4da8919dad58fe5a975c58da73df61ef69c8a8f5900854de1353a24107f9d50af64a3a85cf619ab128d7732ca6e3200", @ANYRES16=r2, @ANYBLOB="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"], 0x334}, 0x1, 0x0, 0x0, 0x24004884}, 0x40) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095002000000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x70) 00:24:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070a00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="1a47b64a5f6656b99098cf4dab6f4dbc624f1197495a1189a1b4a63879946fb15b3b338cb20049d768c3575ce94f2b60e079a455ac39174dac5c46c51584cf4a071ccc3eccdbae782ba26636575a1b655f140821ca51b541261c973154272c83c10c5cedbf92b6f963e313e4c39b3551ef87fd039aa5609ac0b37029c29500cfdde2b2f1f605d72121f831a8177afcac031d81787ff3a9ef304211e2345856858180cb970049d96bda4e4dc9c6975a214cd35922e012f99a29b98293806795e0a87ddb47d6c19ff00c2fc9b818c4aee3c28c7e57d0d02db8", 0xffffffffffffff49}, {&(0x7f0000000340)="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"}], 0x10000000000002f5, 0x0, 0x478}, 0x64880) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) [ 1355.899816][T12962] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[12962] [ 1356.022618][T12966] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[12966] 00:24:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x20000450) 00:24:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070b00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140)={0x1, 0x8001, 0x0, 0x1da}, 0x6) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)="ca7c55dd9c", 0x5}, {&(0x7f00000001c0)="9fe2964ed7b01492a6a4cbdcd61d55aa9ee00ee9dad31b86fa057074dfaacd522704ac68fd3066b15164d01395e1473f9d1cb53109b4f68ab173d8940d7b63a5ae9f217404f4609e70c75595d06e1d7896a0537ec854102cff5940e9a6a409b110d21c9fae03671a725affc3e8b2f8d3d0eba85f5f481f66c78c8d246ceb73f78c58e997fad7390f1331aa72f4e42e4336fbc6b4264bffa976626e9829b71de93e7d0f3e879b8cfd6a7158829db1df3096d64c951c2d9d10c4f5d3381ce843cd145387719616fa01c58f3da1ac347d2ab7ab82a35534ca7e5c1a312412b955a49987c71689ef98eeb3bd0f0d45f60e0a8d2304aae91918ebc0", 0xffffffffffffff2f}, {&(0x7f00000002c0)="81aeae599e8efb5924472ba6a1c127a05734e2ea852a55274d5a8baa573cc7c475c992b71ad46a272f9f5e0778e3e7d7e4f3da5331940922eeffc2a879a0eb75020962878a8cd1c895dcf910a0299ca9c66620a09f7bddbf65c34e6cb55af09abf20e656b48b308ea27f4867d308921edf53053cdf73371b5fc143180664a38c1f0d750bee50a820ecb14ea20e601f8f09472ba2871b9a7bf63b1ba3a26d3f3fd16e0091d6d37f68f598a81e1a3ec164a1860973eadb666d125b6b5796456129876cdeec7829bc89ea017b99cdf3750ca04fed5b893806521242a55f4d9034be183f42121ff30771fa554c810bba", 0xee}, {&(0x7f00000003c0)="690f88ffdd957e4edf0905690146a1157990a695493c6953ddea16133e711148f47389af8ea771b72535ffe6082cfd36d87301909426110e92bdafaa60ccad1160d69e4a737b62d5e01a0a0210c9e958b5c2c66319aeb2af5adf829cf2d3e931ce28713fbcbb83f8c6e1c48df50738a7b75fbf8236c9b5707a55f4118137c7b715ca8537c2750a61bd05426c437c", 0x8e}, {&(0x7f0000000480)="a62c418bdc354cc573947cd677396d664d1227a382b2d5e23c0015e6f52c0b6cedd942a98f9e7057da8c6bf70210adefe696322a5248bc05c4a7775a276708ab371a45067a14717a75deb1950949dc8040afd720881cd10a6842255a18e1f7134679b472cf00294b52b991f70229a34683790ee5a72dbcf9fec3e37a520f82ab534d060f1b1c19dadc7376c283e453f4aa277de1de5896f0edaf0be6778dfa8bc187dc37003d87b127fb8e23aa", 0xad}, {&(0x7f0000000540)="032aad12387b45d81119c9db84de6767057026118904516ececdc8111d0edf66c050ea67c498ccc7469f6348e05497df28c7ff3b15dfcb246d8385b4965e6d8aa1e5ead85d1710fc25ac30d946ac914acce559a2e9a4aac0c47e26531b6065a201d7c14baecb340e6eec34684c7a43cfeed79ef96c178ecef2dc29b190bb932c0d8d542069f562bec38fe65b91c13094469a2163b8f4c7046c98af097807bb0ee8168e7d22d9d6b4927b4355222857518b2e00", 0xb3}], 0x6}, 0x80) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000080)={0x8e4, 0x2, 0x3fb, 0x10000}) 00:24:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095003000000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:27 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x82800, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001880)={0xa6, 0x50f5b0ff98b9a829, 0x9a, 0x8, @scatter={0x6, 0x0, &(0x7f0000001640)=[{&(0x7f0000000240)=""/228, 0xe4}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000340)=""/225, 0xe1}, {&(0x7f0000001480)=""/230, 0xe6}, {&(0x7f0000001580)=""/7, 0x7}, {&(0x7f00000015c0)=""/80, 0x50}]}, &(0x7f00000016c0)="330fd1b03135b7685adc8246388b9857a2c4c8ff53b19f01b9b464250453b06cadaf1f46cce0025ed66588bcaf1f17ece2edbe55112c2f421a6c562b05f40ff74556a4c6ad97d00edbce886b3c428679c6aa5ceccf79732ce5462e2e91d8e350a1860b3caa6a8971876f9b50123b2245e3d3dcbb34b133ab46a287c0e89152c16e744de3cb78bd27692c139620fb220488573f4a6fbf54481980", &(0x7f0000001780)=""/171, 0xe5b6, 0x10029, 0x1, &(0x7f0000001840)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000040)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00', r0}, 0xffffffffffffffd4) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0xffff, 0x100000) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f00000001c0)={0xf, 0x5, {0x2a, 0x5, 0x3, {0x8, 0x4}, {0x28d440000000}, @cond=[{0x1, 0x7, 0x34cc8e91, 0x7fffffff, 0x0, 0x5290}, {0x20, 0x8, 0x5, 0x8, 0x20, 0x100000000}]}, {0x57, 0x6, 0x8, {0x3f}, {0x1, 0xc1d2}, @ramp={0x623, 0x2, {0x8d, 0x0, 0x8, 0x5}}}}) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000001a00)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x14}, 0xc, &(0x7f00000019c0)={&(0x7f0000001940)={0x64, 0x0, 0xfa01fee6407ed7d6, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x447}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x64}}, 0xc006) 00:24:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x1dd, &(0x7f0000000180)=[{&(0x7f00000001c0)="24000000090607031dfffd946fa277853172b8d7eb0b5031e02250830020200a1189baa381f217dde7e74bc0e38912802d11748bc3e1c21973c6221eb58332d192591cd4afa7124776ef044dbb90d7e35b7338ce0fb23287700d559a26d01876b7dd59ded45928480b68d856a7accc040123538bb1b2cc37e08c317911e96baacdabcf0cfd86580d68e91758d404bf85c5cac68fef3d7316276964f070fd5d2514910ade08517d496c412d94597c64de70927fd131ea3773f3ec90c31ed5d96fb7b3d4111d2249d6fb197d5d966e19b1cd46d8dc2c7b40", 0xffffff43}], 0x10000000000002cd}, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x9, 0x18040) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x81, 0x240000) accept$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000000c0)={0x0, r2}) 00:24:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1356.539343][T13009] validate_nla: 54 callbacks suppressed [ 1356.539354][T13009] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1356.544950][T13009] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:28 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='security(self\x00', r0}, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = inotify_add_watch(r2, &(0x7f00000000c0)='./file0\x00', 0x0) inotify_rm_watch(r1, r3) 00:24:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095003f00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1356.669087][T13009] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1356.693300][T13009] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:28 executing program 4: times(&(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 00:24:28 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070e00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095004000000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1356.905804][T13034] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1356.929792][T13034] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) r2 = accept$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) sendmsg$inet6(r2, &(0x7f0000000400)={&(0x7f0000000180)={0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000001c0)="20e4531efa44e1e6f953d097c1d57a43f75fa83dd4f7ea9e1d094fad0e4d7c2ed09f9458db980a95d1bf6a9fb6312c0dc9425319c879c5a6ee38a6d856b8227e40975a66004d4497c5f1eda238f772b7e0a1701fbad9d96e0478dcdb566f74b65f6d6325643c21af2d224587f4ada7562005118ed2fcf0965c166b81ea41021d8a5b3251f7802c2e2fb62745c77ea6a80af7b92b41bb13ecfa6fa0e8fa63ae8a4c6dc89e", 0xa4}, {&(0x7f0000000280)="f28812d7225accae47eeb7106daf49b0a9671745b000be505fedb8261d52336fd9d0558d535fa2b3cf8a78257a83e2be6c6b9bb89125f95307a55f4188d597a0c548e3af57e5cda2c6b5fdd7e2a26319f8301a7b9474c32bd2fe0c366bdde4d0", 0x60}, {&(0x7f0000000300)="fb92cb6563aa76ceca0bbabc646aff868cf644ed823475f8b0112a4e91e3bcf24faea7dc6dd03dd849066ff819855b307b221275542383159e2e306b8e5593039bd8de6c387a63fc84c6349b5866b2a1", 0x50}], 0x3, &(0x7f00000003c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x7fffffff}}], 0x18}, 0x4000000) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 1357.000825][T13034] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1357.022227][T13034] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x111400) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000280)={0x8, 0x1, {0x1, 0x1, 0x3ff, 0x2}}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x5, 0x800, 0x4}, &(0x7f0000000100)=0xfffffffffffffd47) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e24, 0xffffffffffffffff, @remote, 0x7ff}}, 0x200, 0xfffffffffffffffc, 0x200, 0x5, 0x4}, &(0x7f0000000140)=0x98) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xeda8227e0a50b0aa, &(0x7f0000000400)}, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070f00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000007c0)={r3, 0x20}, 0x8) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000340)) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r2, &(0x7f0000000900)={{r4, r5/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000980)={0x7, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000580)={r7, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000300)={r6, &(0x7f0000000480)=""/112}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000100)={r6, 0x3}) r8 = socket(0x4, 0x3, 0xffffffffffff8000) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r8, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1c0, r9, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe32}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x76a3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x248}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xddff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe36}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf597}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb63}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\xc6\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92g\xe8\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095004c00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x80000) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000140)={0x1, 0x1d3}, 0x2) 00:24:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1357.268613][T13056] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 00:24:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) fstat(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000200)="636b059437bf0eb2fd28e34f42507368bd5c574df0b4027ca44e4abfa0f2c9ea4992ba3d1d7fd8f57e2c408d668039dcc6ec63d5f8a7b0e006ff88f337c823b717fe840a4b1ed9895d2e264cd27799712129dce295feb4cfd8354ab15e55beb2a42d95", 0x63}, {&(0x7f0000000280)="047e36bd312b21e44d2587b75a3ac4bb20fcd90d38c00164e8dbd528a992013f73c45ba5f7a23c79256fd42333283c8959953cb81b408838c2edd05123dc5407f5b28c5ffce2b3b9f349c0df0b7333921b12ec8a2f08817c9927e9b01776dd02de43c6391b539ddd3db9ba7253f00baa8af31336234d86b01dbc9f096885cd8057794009f85d3558d44bfd8c3d807f04705f9b7172f967c5f7b2f1fbb841ef2a40ed04de3c3a39198c558a54a172bb3cc97e3b7ca58b2006619062da15aacb683249839d724ba6e29f1319", 0xcb, 0x3f}, {&(0x7f0000000380)="e1ce6e8115e0ffb57a72", 0xa, 0x6}, {&(0x7f00000003c0)="3b6c00fefc9009e20c22c60dc05a21db0fa3de8d61", 0x15, 0x5}, {&(0x7f0000000400)="2807e55906f44ef57f195ac7152fe0809b4e7dca255b830d2e97f83d47a9d4a2192c0263c71f0541f5691cceb4a9d6c8c53a77f39c1efd7092956d085955e757f731d07726454d73d843ab114672534ccca4e94ecb75820693f7a794f4", 0x5d, 0x5}, {&(0x7f0000000480), 0x0, 0x7fff}], 0x384002, &(0x7f0000000800)={[{@dots='dots'}, {@nodots='nodots'}, {@fat=@gid={'gid', 0x3d, r3}}, {@nodots='nodots'}, {@fat=@uid={'uid', 0x3d, r4}}, {@dots='dots'}], [{@euid_lt={'euid<', r5}}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x34, &(0x7f0000000080)={@rand_addr, 0x0}, &(0x7f00000000c0)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r8 = fcntl$dupfd(r7, 0x0, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x7, 0x10001, 0x10000, 0x10, r2, 0xff, [], r6, r8, 0x1}, 0x3c) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) [ 1357.356457][T13061] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1357.403494][T13061] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1357.420081][T13056] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 00:24:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005071000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f00000002c0)) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@empty, @in=@loopback, 0x4e22, 0x1000, 0x4e20, 0x56, 0x1, 0x90, 0x17fe5cf3e4855a15, 0x2f, 0x0, 0xee01}, {0x20, 0x4, 0x7, 0xfffffffffffffffa, 0x5ecb, 0x965e, 0x8d, 0x3}, {0x9, 0x7, 0x3, 0xffffffff}, 0x0, 0x6e6bbf, 0x2, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0xff}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x17}, 0x3506, 0x1, 0x2, 0xa7d, 0x240, 0x20, 0x98a6}}, 0xe8) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000240)={0xc, 0x8, {0x53, 0xfff, 0x2, {0x71, 0x3}, {0xfff, 0x1c000000000}, @rumble={0x100000001, 0x800}}, {0x1, 0x5, 0x5, {0x7fff, 0x3}, {0x8, 0x8}, @rumble={0x2be, 0x9}}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) r2 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r2, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r2, r2, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0x1, 0x1f, 0xfff, 0xd8d, 0x2}) 00:24:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095004e00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:28 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) 00:24:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005071100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1357.721089][T13087] QAT: Invalid ioctl 00:24:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x2000) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000053e0e668e8e6f9f2320000080000"]) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:29 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00', r0}, 0x10) 00:24:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095005000000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005071200"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'s#\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@builtin='builtin_trusted\x00') 00:24:29 executing program 3: pipe2(&(0x7f00000002c0), 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r1 = memfd_create(&(0x7f0000000280)='\xe8\x90K\xdd\xdfk\x0fF\x99\x00\xc8\x10\x9f\x91\x9a@y\xfd\xed`P\xc1d\x19\x94#+\x83\t\x9c\x84#\x7f\xe2\xd1\xbf\t>\xe2\x15\xb0Q\xf8\x8deMg\x1f\x83i\x96\x97\x18\v\x89zXa\x1f\xb7&\t\xe6\'P\x92K\xcf\xd9\xf9;c\xdbDy\x00\xcd\x95\xbd\x8c}\x12\x18R\x8af\x19rE\x7f\x85\xdb\x92|\'\xbc\x1cR\x89\'\xd35\xe0\x1d\x0f\x9e\xfa\xcf\xef1(\xe0+QL5\x97Q\x97\xc1\x0f\xfe]\xf4\b\x92EV\xffo>\x8di\xa99l\xe2\xe9!\x9c\xea[\x87\xb7xW\xa8\xeb,v>i\x1eF\x16\x16\t\xc2\x00\xd4\x83})u\xf0\xdc\xc6\xfb%\xfe\xe4|a\x91\xee_\'\x02\x18\xfc\'\xf6\x1e\x00\xa5\xb0-=\xf1d\xf8\xc3\x87\xeb\x95o`\t\n\xb3\xb9\b\x89\x80\xa2Z/\t\xde\x8ep\a\"o\xee|R\x9c6g\x9b\xe7S\xb64\\Ir\'7\xe1\x81\xf3d\x9d,\xfd\x0e\xd3\x87\xd6xo\x14I\xc9\x8d\xd5\xd4<9\xcd\x17R\xa1$\x14\x99\x90m\x03>\x9b{Hb\xed\x1bO\xa4\xd5\xfc\xbcm\xacm\f\xc8\x98\xd7\xc3\xa6<\xd5\xf7\xeaJ3\x82\xde\x05\xb4(\xaf)Q\x7f\xd8&G\x9d\x99\x8c\x15\xdb\xa5\xeb=\xa8^N~\xb2\\vOek\xff\x83}\x9b\x1d\xcf\x04\xc2V\x11\xd1\xaeX\xb7\xd8\xa0/', 0x3) fcntl$addseals(r1, 0x409, 0x8) fcntl$addseals(r1, 0x409, 0xa) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x40900, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r0) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) socketpair(0x3, 0x4, 0xffffffffffffffff, &(0x7f00000005c0)) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x2, 0xcaa2}}, 0x30) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000600)=@assoc_value, &(0x7f0000000400)=0x8) r5 = syz_open_dev$radio(&(0x7f0000000680)='/dev/radio#\x00', 0x3, 0x2) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r5, 0x111, 0x1, 0x58ff, 0x130) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000200)) getrusage(0x7ffffffffffffffd, &(0x7f0000000300)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000640)=0x80000001) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4200080}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r6, 0x1000, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 00:24:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005071300"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095006000000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:'}) 00:24:29 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={r0, r1, 0x4, 0x2}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000640)='./file1/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="74e82e37949910d3c727aa64654eac25ca7734a556f8e9ee59ce1141dfe677490574eae8e365ae34eb6143281a946f53fc6389a119b847b6bb0b3e9fa430c6956a7946f737663365537ccefeb773c0", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x5c, 0x1) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={r5, r6, r7}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @empty}, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) getuid() geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@initdev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x40000, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@rq={'rq', 0x3d, 0x2}}, {@timeout={'timeout', 0x3d, 0xff}}, {@rq={'rq', 0x3d, 0x7}}, {@timeout={'timeout', 0x3d, 0xa63}}, {@common=@dfltuid={'dfltuid', 0x3d, r6}}, {@common=@version_9p2000='version=9p2000'}, {@timeout={'timeout', 0x3d, 0x6}}, {@rq={'rq', 0x3d, 0x23}}, {@sq={'sq', 0x3d, 0x8}}]}}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r9, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$TIPC_DEST_DROPPABLE(r9, 0x10f, 0x81, &(0x7f00000006c0), 0x4) open_tree(r0, &(0x7f0000000680)='./file0\x00', 0x81101) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x971, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x3}, 0x0, 0x0, &(0x7f0000000700)={0x4, 0xb, 0x7, 0xfffffffffffffffa}, &(0x7f0000000740)=0x3ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=0x7}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r10 = socket(0x10, 0x3, 0x0) write(r10, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:29 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc477, 0x8000) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000040)={{0x1, 0x8}, {0x6, 0xfffffffffffffffd}, 0x9, 0x4, 0xb8}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005071400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = getuid() getresgid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) chown(&(0x7f00000001c0)='./file0\x00', r1, r2) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) socketpair(0x0, 0xa, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e23, 0x80000, @empty, 0x7ff}, @in6={0xa, 0x4e20, 0x3, @ipv4={[], [], @remote}, 0x7ffe}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e23, @rand_addr=0xe}, @in={0x2, 0x4e23, @local}], 0x78) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 1358.513553][T13150] ptrace attach of "/root/syz-executor.2"[8953] was attempted by "/root/syz-executor.2"[13150] 00:24:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095007000000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{}, {}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0xfd43) [ 1358.711079][T13164] ptrace attach of "/root/syz-executor.2"[8953] was attempted by "/root/syz-executor.2"[13164] 00:24:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005074800"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:30 executing program 4: exit_group(0x5) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200a01, 0x0) r2 = socket$inet6(0xa, 0x0, 0x8010000000000084) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={r4, 0x3}, 0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r4, 0x40}, &(0x7f0000000180)=0x8) r5 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) r6 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r7, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r7, 0xc0305616, &(0x7f0000000200)={0x0, {0x1, 0x4}}) write$FUSE_LSEEK(r6, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$PPPIOCSMRRU(r6, 0x4004743b, &(0x7f00000001c0)=0x310) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$P9_RVERSION(r1, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x7f, 0x8, '9P2000.L'}, 0x15) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x2) 00:24:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095008500000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:30 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x101000) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x284140) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r2, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) sendto$inet(r2, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000100)={'broute\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f00000000c0)=[{}], 0x0, [{}, {}, {}]}, 0xa8) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000001c0)={0x43, 0x3, 0x9, 0x8000}, 0x6) recvfrom$rxrpc(r1, &(0x7f00000005c0)=""/4096, 0x1000, 0x0, &(0x7f0000000040)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e23, 0x6, @empty, 0x401}}, 0x24) 00:24:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005074c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:30 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000001c0)={0x53, 0x0, 0xfffffe1f, 0x2, @scatter={0x1, 0x3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/193, 0xc1}]}, &(0x7f0000001280), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc070d3f500000000}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2000, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) 00:24:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="118cbdd0b206dc321d388f133de000") sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x303, &(0x7f0000000300)=[{&(0x7f00000001c0)="e652393724fcb5dd0ef5b4c39f33df8adec96e3eca3b086004e39c3c29dadb2c57758de1a9ad9ef13ad629ff1b64484b0422bf00a9d9cf1fb046545d0f669bb67b1f1cf624f71663837e3edfc24c962521b98123d0ec71901043fac9f7159660cf641495920dbdd4fea9c3b9e95a4f"}, {&(0x7f0000000140)="b8e8ee036af40dd2ee9a29f64e28ae0b34"}, {&(0x7f0000000240)="d3f43aa566814cd0f76c6955d6676ac2eaf103c79cc0227efa8c12f529ad8fcbda9b947bb8c110793548c48287d4766cf6fd53d6b063ee7b0bcf92028fd48e5a29670fb59b95c60c6adb493325ac4283611ae94474fb42942ddce821c59191a6e313bf57cc5af07c4a", 0x68}, {&(0x7f00000002c0)="0315463d722a9bd5875dcbf90f5528e066fddc902fcd876ad6f60a85a0c018957cbd8e689fba4365740a4cfcf15896347cfa70e5b058", 0x183}], 0x0, 0x0, 0xffffffffffffff35}, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000040)=[0x4, 0x3], 0x2) 00:24:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005075400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ff9f00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:30 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000180)={'veth1_to_bond\x00', 0x401, 0x86}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000000100), 0x5bd, 0x24000b00) write$FUSE_WRITE(r2, &(0x7f0000000140)={0x18, 0xffffffffffffffda, 0x5, {0x1}}, 0x18) 00:24:30 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getdents64(r0, &(0x7f0000000000), 0x0) 00:24:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005076000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffb100000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x43a000) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000140)) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r6, 0x0, r6) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) fcntl$getownex(r7, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f00000004c0)) r10 = getgid() r11 = socket(0x10, 0x3, 0x0) write(r11, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f00000002c0)="abc323f0c039c6a217e501f8655508447419fd5ceb6dd74b2a539748a401fcc39fd88282fa56655eb587da935a2666f937657b2d3caba2b5471d1ab3f5b7d5f1f0103f3a124ca02c918fe486b9226ac0b3232be8504a8d609f86239d87aa609bc5513a68", 0x64) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="080001000f7ac0dcf0226d25e129deda09327d8620b5cfcebff14cc3be5b495628d8b6ff6e8e1b2a16be8bbd279a5b8e3ed6f8941938c0ac1223d825d0e5e7a46c", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x5c, 0x1) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={r8, r9, r10}, 0xc) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={r12, r5, r10}, 0xc) bind$rose(r2, &(0x7f00000000c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x1d3) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:31 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000), &(0x7f0000000000)={'\x00\x00\xff', 0x3}, 0x0, 0x0, r0) socket$pptp(0x18, 0x1, 0x2) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r3 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r3, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r3, r3, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r3, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000100)=0x57) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='blackl)st\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$KVM_GET_TSC_KHZ(r4, 0xaea3) 00:24:31 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000000)={0x7fffffff, 0x0, [], {0x0, @bt={0x6, 0x800, 0x0, 0x0, 0x7, 0x2, 0x800, 0x9512, 0x5, 0x0, 0x2a, 0x7, 0x0, 0x7, 0xe, 0x8}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) [ 1359.792115][T13233] ptrace attach of "/root/syz-executor.2"[8953] was attempted by "/root/syz-executor.2"[13233] 00:24:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffb200000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005076800"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1359.910537][T13233] ptrace attach of "/root/syz-executor.2"[8953] was attempted by "/root/syz-executor.2"[13233] [ 1359.934407][T13243] encrypted_key: insufficient parameters specified 00:24:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:31 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) socketpair(0x8, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) 00:24:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x1e50c3, 0x0) 00:24:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffb400000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005076c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950ee600000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:31 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x972b31d0b6129ffa) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f0000000080)={&(0x7f0000000000)}, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0x18) 00:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005077400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) 00:24:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500ff00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1360.799407][T13295] encrypted_key: insufficient parameters specified [ 1360.843712][T13295] encrypted_key: insufficient parameters specified [ 1360.880402][T13299] encrypted_key: insufficient parameters specified 00:24:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d510bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba2", 0x20}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000080)={0x3ff, 0x8, 0x10001, 0x0, 0x7}) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000100000002230000080001007f000001", 0xba) 00:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005077600"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1360.909364][T13299] encrypted_key: insufficient parameters specified 00:24:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.advise\x00', &(0x7f0000000180)=""/250, 0xfa) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) io_setup(0x5, &(0x7f0000000300)=0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000500)={0x9, 0x2, 0xa6}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = creat(&(0x7f0000000440)='./file1\x00', 0x110) io_cancel(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x6, 0x400, r3, &(0x7f0000000340)="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", 0xff, 0x0, 0x0, 0x1, r4}, &(0x7f00000004c0)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:32 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000959fff00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005077a00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:32 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0x1, &(0x7f0000000000)=[{0xf4, 0x0, 0x0, 0x2}]}, 0x10) fallocate(r0, 0x0, 0x40, 0x4) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getsockopt$inet_mreqn(r1, 0x0, 0xd616bde10f9ce757, &(0x7f0000000000)={@multicast1, @dev}, &(0x7f0000000040)=0xc) 00:24:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @local}, {0x2, 0x0, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='lo:\x00\x00\x06\x00\x00\x00\x00\x80\x00\x00\x00\x00\x01'}) 00:24:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b1ff00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x936b07a4da179ec7, 0x0, 0x0, 0x1d7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x10f}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005077c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:33 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, &(0x7f00000000c0)=0x1, 0x9, 0xc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x200080, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000180)={0x6, 0x0, {0x3, 0x1, 0xfffffffffffffffc, 0x3, 0x1}}) 00:24:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b2ff00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1361.785463][T13351] validate_nla: 58 callbacks suppressed [ 1361.785474][T13351] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:33 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)=':chain\x00', r2) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f00000005c0)=0x40, 0x4) r4 = add_key(&(0x7f0000000240)='cifs.idmap\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000002c0)={r4, 0x8c, 0xb5}, &(0x7f0000000600)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6d69636861656c5f6d6963000086ca846a414b000000000000000000000000000000000000000000f4ff00"/85], &(0x7f0000000380)="2308eed7f9e87d3e37db5013498521c8b98f6eb5336928036e9918df58cf955e0e32ec3cc125ba2d0933ceb7103e255ac96365c3be877911c81822af261e61136e445f1ff521d1d62794716ae93ce1b867de065de3e8743ba168fb7fc1ac65dc4796d0b927dd32df800e11d857b3e9a0edf926fffed667545ece1f0dde85f1cf0798b7b1d4904b2c43ef5d7b", &(0x7f0000000440)=""/181) r5 = syz_open_dev$admmidi(&(0x7f0000000500)='/dev/admmidi#\x00', 0x81, 0x101000) ioctl$UI_END_FF_UPLOAD(r5, 0x406855c9, &(0x7f0000000540)={0x1, 0x100000001, {0x52, 0x7, 0x5, {0x5, 0x4}, {0x3ff, 0x5b8d174a}, @ramp={0xec0, 0x4, {0xf12, 0x8000, 0x2, 0x9}}}, {0x52, 0x4, 0xffffffffffffff9c, {0x5, 0x8001}, {0x3, 0x8001}, @const={0x8, {0x9, 0x7fff, 0x3, 0x4}}}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="1f0000000000000000000040050001000000e7fc4b0900000000000000b7871001000000000000002560b700ef"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x48c}]}) [ 1361.867088][T13351] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1361.903474][T13351] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1361.925715][T13351] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b4ff00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507f000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:33 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x3, 0x400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={r1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r1, 0x3ff, 0x6}, &(0x7f0000000340)=0x8) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x2406c1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4000000000000004) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)=[0xfb8, 0x1000]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f0000000240)="db", 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)='\x00', 0x1, 0x0, 0x0, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 00:24:33 executing program 4: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) r1 = add_key$keyring(&(0x7f0000000140)='keyrin\x06\x00', &(0x7f0000000080)={'z\x00'}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 1362.248266][T13379] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1362.306194][T13379] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1362.320192][T13383] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1362.341881][T13379] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000954b0001000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1362.350591][T13384] encrypted_key: insufficient parameters specified [ 1362.375383][T13384] encrypted_key: insufficient parameters specified [ 1362.382497][T13379] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:33 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x4000, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000140)='silent\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507260100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:34 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000000)) 00:24:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095241e06000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1362.661368][T13399] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1362.682943][T13399] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507560100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) prctl$PR_SET_DUMPABLE(0x4, 0x1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x414200) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) 00:24:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950fff07000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:34 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003000000017000000030000000a0000000000000b030000000f0000000000000c05000000060000000000000901000000060000000000000700000000006100"], &(0x7f0000000600)=""/181, 0x4b, 0xb5, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x0, 0x1}, 0x0, 0x0, &(0x7f0000000540)={0x4, 0x2, 0x9, 0x2}, &(0x7f0000000580)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x8}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0xb, &(0x7f0000000ac0)={&(0x7f0000000900)=""/167, 0xa7, r2}}, 0x13a) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f0000000100)=""/192, 0xc0, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000240)={&(0x7f00000000c0)=""/11, 0xb, r3}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='/eth0\x00'}, 0x10) 00:24:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:34 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@echo_reply={0x3}}}}}, 0x0) 00:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507840100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:34 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00', r0}, 0x10) 00:24:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000000c0)='\xc6qDR\xe9\xab\xf9\xfb', &(0x7f0000000140)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = dup(0xffffffffffffffff) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r3, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r3, r3, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r3, 0x0) fcntl$addseals(r3, 0x409, 0x8) 00:24:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f0000000200)=""/114, 0x72) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x6d, &(0x7f0000000480)={r1, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000140)=0x2d3) 00:24:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ed3009000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507a00100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:34 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) fcntl$setown(r0, 0x8, r1) 00:24:34 executing program 2: 00:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507a40100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:35 executing program 2: 00:24:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000010000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:35 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0xfffffffffffff9db, 0x5, 0x10af2cfb, 0x1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000000)={0x1, 0x2, 0x1000, 0xb08, 0x10, 0xf5}) ioctl$VT_DISALLOCATE(r0, 0x5608) 00:24:35 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) capget(&(0x7f00000000c0)={0x0, r0}, &(0x7f0000000140)={0xfae, 0x0, 0x3268, 0x3, 0x1000, 0xf7}) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x11) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000180)) 00:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507b00100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:35 executing program 2: 00:24:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000020000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:35 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) 00:24:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev\nbus/usb/00\xe9a\xe1{d\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0x3, 0x3}}, 0x30) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000006c0)='user\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') 00:24:35 executing program 2: 00:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507060200"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:35 executing program 3: r0 = socket(0x10, 0x80000, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000000)={0xa, 0x5, 0x69b50e02, 0x40, '\x00', 0x4}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x200000) listen(r1, 0x800) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$RTC_PIE_OFF(r1, 0x7006) 00:24:35 executing program 2: 00:24:35 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = socket$inet6(0xa, 0x0, 0x8010000000000084) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r5}, 0x14) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r6, 0x6612) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000002640)={0x0, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r8 = socket$inet6(0xa, 0x0, 0x8010000000000084) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000000)={r10}, 0x14) sendmsg$inet_sctp(r2, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r5, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r7, @ANYBLOB="00000000000000008400000002000000060000800500000000000000", @ANYRES32=r10], 0xf8, 0x40000}, 0x4000) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r5, 0x7f}, 0x8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000040000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:35 executing program 2: 00:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507400200"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:35 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x40c101, 0x0) write$P9_RREAD(r0, &(0x7f0000000980)={0x100b, 0x75, 0x1, {0x1000, "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"}}, 0x100b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00', r1}, 0x10) seccomp(0x1, 0x1, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x14, 0x5, 0xb8c, 0xf6}, {0x7ff, 0x8, 0xff, 0xcf6b}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000340)={0x3, &(0x7f0000000180)=[{}, {}, {}]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') 00:24:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:36 executing program 2: 00:24:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000060000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="372271963a4059", 0x7, r1) r3 = add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="86aa1d75843e85056df2444b7f5583087a6a12b669179dd749", 0x19, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa85\x00\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[\x03K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f00000001c0)=@keyring={'key_or_keyring:', r2}) 00:24:36 executing program 2: 00:24:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x100000004, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000001c0)='MASQUERADE\x00', r0}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0x1c8, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x368, 0x368, 0x368, 0x368, 0x368, 0x5, &(0x7f0000000000), {[{{@ip={@multicast2, @multicast1, 0xffffffff, 0x80000000, 'bcsf0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x2, 0x1}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @port=0x4e23, @icmp_id=0x66}}}}, {{@ip={@empty, @remote, 0xff000000, 0x0, 'lo\x00', 'bpq0\x00', {0x1fe}, {}, 0x11, 0x2, 0x22}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x10, 0x2, 0x50c7095b, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x9, @multicast1, @dev={0xac, 0x14, 0x14, 0xc}, @port=0x4e22, @port=0x4e20}}}}, {{@ip={@rand_addr=0x1f, @loopback, 0x0, 0xff, 'syzkaller1\x00', 'veth1_to_team\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x10, @loopback, @rand_addr=0x9, @gre_key=0x4, @port=0x4e24}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @icmp_id=0x65, @port=0x4e20}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) 00:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000300"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:36 executing program 2: 00:24:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) listen(r1, 0x7fff) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0xa000) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000140)=0x7, &(0x7f0000000180)=0x2) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000080000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507370300"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:36 executing program 3: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r1 = accept$ax25(r0, 0x0, &(0x7f0000000000)) fgetxattr(r1, &(0x7f0000000040)=@random={'security.', 'map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'}, &(0x7f0000000180)=""/126, 0x7e) 00:24:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:36 executing program 2: 00:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507480300"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095a00080000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:36 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000140)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x2f1) 00:24:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/netlink\x00') epoll_pwait(r3, &(0x7f0000000140)=[{}], 0x1, 0xc4, &(0x7f0000000180)={0xd8}, 0x8) 00:24:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:36 executing program 2: 00:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000500"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:37 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = semget$private(0x0, 0x0, 0x8) semtimedop(r0, &(0x7f0000000000)=[{0x1, 0x6, 0x800}], 0x1, &(0x7f0000000040)={0x77359400}) 00:24:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffff80000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f00000000c0)={0x20, 0x1, 0x8, 0x124}) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0x2) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f0000000180)=""/102, 0x8000, 0x3000, 0x46254134}, 0x18) 00:24:37 executing program 2: 00:24:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000600"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x2) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="748634e793e8e11eb8dd9c9d9a719f30f0be257afcebb3315c1d390e00c27b4d5a8eb5883ad9bed19c06f697544fbb04a07fe5e777ed4fc941b17a96504c6607f248ca4872536d302354c87db6f704f62e229fba19e8f9470ffea20731", 0x5d, 0xfffffffffffffffa) 00:24:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000010000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:37 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000140)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x90T(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, r0}, 0xffde) 00:24:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(r0, 0x0, 0xfddf) 00:24:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) sendto$netrom(r2, &(0x7f0000000140)="1c58c9bc94db48097a16ba745a1d2c61bd1239d51b36f86c2ad8268dd760bae4a928714d025478c51073aad4f6248899728680d494e67cdc2c81af2c11aa864999", 0x41, 0x800, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507020600"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000020000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:37 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x40, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000000)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, r0}, 0x2bc) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f00000001c0)={0x2, 0x1, 0x2, 0x5, 0x3ac2, 0x1}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000180)) 00:24:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6f0a77bd) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@buf) 00:24:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000700"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000030000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:37 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x4}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc00, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000080)={0x0, 0xffffffff, 0x8, 0x400, 0x14, 0x7}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='\x01', r0}, 0x10) 00:24:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) eventfd(0x400) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f00000000c0)={{0x3, @name="af5683f8e2f5ef0dbbc742a3f21e753b285f65fcceffb308e443bb0ed9464d6b"}, 0x8, 0x2, 0x8}) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x80000001) 00:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000900"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000040000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x6d, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000140)=0x2d3) [ 1366.847031][T13691] validate_nla: 54 callbacks suppressed [ 1366.847043][T13691] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:38 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x2002040) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10003, 0x0) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000140)) accept$netrom(r2, &(0x7f0000000040)={{0x3, @bcast}, [@rose, @default, @remote, @default, @null, @bcast, @default, @default]}, &(0x7f00000000c0)=0x48) 00:24:38 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0)='\x94y\x9b\xb2\xed\x19\xa4\xd1', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000200)=0x0) syz_open_procfs(r5, &(0x7f0000000240)='net/icmp6\x00') write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) fsconfig$FSCONFIG_SET_FLAG(r3, 0x0, &(0x7f0000000040)='dirsync\x00', 0x0, 0x0) connect$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 00:24:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1366.887767][T13691] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1366.922736][T13691] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:38 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x8001, 0x0, 0xf8}, 0xc) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) [ 1366.945984][T13691] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000050000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000a00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x44, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b542"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:24:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1367.199174][T13712] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000040)={0x81, 0x0, [0x6, 0x5, 0x1, 0x401]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000000)='\x00'}, 0x32a) socket$inet6_udp(0xa, 0x2, 0x0) 00:24:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 1367.243240][T13712] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1367.277864][T13712] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1367.333700][T13712] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000380)="11dca50d440bcfe47bf070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000040)={0x94f, 0x7}) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000a00), 0x211, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000060000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000b00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x8, 0xd66d, 0x40, 'queue1\x00', 0x8001}) 00:24:38 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000002c0)=0x68) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) sendmsg(r1, &(0x7f0000000200)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x2, 0x2, 0x0, 0x7ff, "76deaa81f7b7b625c2b3b19af251c5e152c06b0a214c4c6268e2ffcc57239497751af7e75667832d03ad25269233c01b263561ee674ec5b369c7b27b91152c", 0x3d}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="a32634581e32f5da8145f06739abaeddfcf8b0680caee7406e9e07a11f46ce592aee26eddfe3b732424849859506d1", 0x2f}, {&(0x7f00000000c0)="f765c0bcdaa6619f9d97e3", 0xb}], 0x2, &(0x7f0000000140)=[{0xc0, 0x105, 0x1800000000000000, "ba819400d276257c693185db270e743fbe7115b009b5726cc01bf9662432401911aae0b23b916806a3232f5f47bfa8fcd99168f1a08d75173b0d8afea9065725738a1e54cba7186336fbf48cd2d806bb45ad2008650dfd162c77d53a7578e170a5632e09287e5aad6b09ec1eb0edc79bb28ddb36549298fb662704c7fc0a6f10d7d08c41b6015d0e1521addd87ed63f4cd2181d774531e173642bda1a83de72bbc2a52e72a65eee846"}], 0xc0}, 0x8001) [ 1367.687223][T13748] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1367.715214][T13748] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000070000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:39 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000180)={0x0, r2}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x220080, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r4, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null, @bcast, @rose, @remote, @default]}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x500, 0x0) r5 = dup2(r0, r1) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x1}) 00:24:39 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000000)) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netlink\x00') setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 00:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000080000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000e00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:39 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f00000021c0)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}], 0x1}}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\xc9\x13c\xe0\x95\xab\x8d\x7fx#\xe9\xeeq;\xadL\xc4\x13\x9a\x1eR\xa4A\xb5\xcb\xd6') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r2 = accept(0xffffffffffffffff, &(0x7f0000001b40)=@nl=@unspec, &(0x7f0000000900)=0x80) r3 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r3, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r4, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) sendmsg$xdp(r2, &(0x7f0000001c80)={&(0x7f0000001bc0)={0x2c, 0x1, r4, 0x1}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001c00)="e03ed61dad3a26a526a801a1034936211fd4a52a394b1fcc7a002b3b705313b126bedc83dd37c115d099d1ec62d15eee9a00190219122d0072c353b66d", 0x3d}], 0x1}, 0x10) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r5 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x20902, 0x20) r6 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x80800) accept$unix(r6, &(0x7f0000000200), &(0x7f0000000180)=0x6e) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0xc04c5349, &(0x7f0000000040)={0x1, 0x9, 0x8}) 00:24:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x9, @remote, 0x4}}, 0x1, 0xffffffff, 0x0, 0x100000001, 0x10}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x65, "e29b02123c5dd93cec88867fd3b1c8f0ae2c6e006a52bab2fc8564796b8f55d3335a4692f732ee258bd91a0c7602a4beca668258d0763cbc4c0e7ee99824140f78e716f19ba0319894eb583f400c84de7411d38c660cbcbaeea78f7b10011b7b05e5b380c1"}, &(0x7f0000000080)=0x6d) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={r3, 0x5}, &(0x7f0000000100)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) open(&(0x7f0000000300)='./file0\x00', 0x400, 0x2) 00:24:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000a0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000f00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r2, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) sendto$inet(r2, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) r3 = socket$inet6(0xa, 0x0, 0x8010000000000084) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r5}, 0x14) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r5, &(0x7f00000002c0)=0x4) r6 = accept4$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x800) getsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000200), &(0x7f0000000240)=0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x337f34513f1527d0}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r8, 0x300, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x25}, 0x80) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:24:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) prctl$PR_GET_NO_NEW_PRIVS(0x27) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = dup(0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000004000000301000000000100", @ANYRES32=r5, @ANYBLOB="04000200"], 0x20}}, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r6, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r7, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r8 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r8, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000e80)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff42e5c0a350fb8a910ff1c61ce00beee42bde2fb1eada5719e0b397d2546b6c116d3f5e89302584bb8d1ec6405824e1605252a279d2f4a91ad74c08110a8ee94cd6cb51f7b2cc9780c43e300efd36b2ea2fb7254babb7ab88a30fd975ea7ec669015b7e778c607"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r9, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) socket$kcm(0x2, 0x3, 0x2) recvmsg(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r10, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r11 = socket$kcm(0x2, 0x5, 0x2) recvmsg(r11, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r12, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) socket$kcm(0x2, 0x3, 0x2) recvmsg(r2, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x33e, &(0x7f0000000e80), 0x0, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r13, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r14 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r14, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r15, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r17 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r17, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r18, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r19 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r19, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r19, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xffffffffffffffb3) r21 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r21, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000c00)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fffbfb763d703b7e1d525941ecbc24a90158876cdb5bd33be528ae127a99d1045b9c4c2dc957ad274a7bf4870e595", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r22, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r23, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r23, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r25, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) recvmsg(r25, &(0x7f0000000600)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/118, 0x76}, {&(0x7f0000000540)=""/34, 0x22}], 0x2, &(0x7f00000005c0)=""/39, 0x27}, 0x10000) r27 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r27, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0), 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d7dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf00900000000000000e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r28, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000740)={0x49c, r4, 0x82, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r7}, {0x1a0, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r29}}}, {0xffffffffffffff3e, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r15}, {0xf4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xc00000}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8}, {0x194, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x7, 0x8001, 0x1}, {0x6, 0x3f, 0x5, 0x9}, {0x4, 0x7, 0x0, 0x8}, {0xed83, 0x9, 0x5, 0x4}, {0xff, 0x4, 0x400, 0xc}, {0x7f, 0xcf, 0x6, 0x36c}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x394, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}]}}]}, 0x49c}}, 0x8810) 00:24:39 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80800) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x2, 0x20000000000000, 0xffffffffffff5f84}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000d0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507001100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1368.513215][T13797] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:24:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000e0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket(0x22, 0x2, 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffc) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40102, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000180)) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) socket$vsock_stream(0x28, 0x1, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x101000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x100000000000000, 0x0, 0x0, 0x9}]}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r6, &(0x7f0000000040)={0x4}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x100, 0x0) 00:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507001200"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507001300"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:40 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x12, 0x601}, 0x20}}, 0x0) [ 1369.239777][T13813] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:24:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = getpgid(0xffffffffffffffff) ptrace$getsig(0x4202, r1, 0x80000001, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x6, 0x10000) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r4 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffffffff, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x73, 0x1, 0x0, "0de149d2d7311287b0c2ed2131277c94", "984bb40744aadb0eef3ab9f0b65c01032ff82cacd5f18d551daf8e8cd37db3053b45ccf6909c840999e6be144d0449c0842676f177153ef9d06097ea9fde5981ef6c973004778edd103d3d5824bf75521ac199ddf3d2399069cd830d3bce"}, 0x73, 0x2) 00:24:40 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2e000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000080)=r1, 0x1) 00:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507001400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000e60e0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000140)={0x0, 0x6}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000f0100f7ff0000000074e7f8119035d776000000280012000c00010076657468e99a4b193b2e66810001000018000200", @ANYRES32=0x0, @ANYBLOB="0000848aaf4a1d81760a2f2be32f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b86393215be79073126d7e3267c909fb647903296de60d3319ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a54d49ecc96616735f20e5023a8128fb1222223befb95e2e4e66e2d17283"], 0x48}}, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f00000002c0)=0x6, &(0x7f0000000300)=0x4) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x52, 0x1, 0x0, "617535e76dde1c1d3c841645d0d36c7d", "daecc9de68e4adf427289c9a86502b78756d1116d60c8db23fd1779013f6d92eb30182ba73b8ee2c929cd598aa2f496a9e7a1db14f36bd91af81c2d45d"}, 0x52, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=@newqdisc={0x5c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}, @TCA_STAB={0x4, 0x5}]}, 0x5c}}, 0x0) 00:24:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1369.396826][T13852] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1369.423268][T13858] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 00:24:40 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x301100, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$BLKRRPART(r0, 0x125f, 0x0) 00:24:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000f0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507eb1a00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000006fc0)='/dev/rtc0\x00', 0x0, 0x0) pread64(r2, &(0x7f0000007000)=""/222, 0xde, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f00000000c0)=0x3, 0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:41 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x1, 0xfffffffffffffffd, 0x4, 0x6cb4, 0x3f}) 00:24:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) r4 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r4, &(0x7f0000ffc000/0x3000)=nil, 0xd48a5a656600d03e) shmctl$IPC_INFO(r4, 0x3, &(0x7f00000003c0)) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r6 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r6, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$FUSE_NOTIFY_STORE(r5, &(0x7f00000005c0)={0x30, 0x4, 0x0, {0x5, 0x1, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) renameat2(r5, &(0x7f0000000500)='./file0\x00', r6, &(0x7f0000000540)='./file0\x00', 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x100, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "15043169"}, 0x6, 0x0, @fd, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_inet_SIOCGIFADDR(r8, 0x8915, &(0x7f00000001c0)={'bcsf0\x00', {0x2, 0x4e24, @local}}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r9, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) connect$bt_l2cap(r9, &(0x7f0000000580)={0x1f, 0x2, {0x555, 0x6, 0xe61, 0x6, 0x0, 0x9}, 0x8a1b, 0x9}, 0xe) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106], 0x1f000}) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f00000002c0)={0x6, @raw_data="e609f181ba3cb70cd704f3e380f0987c91bf19a07ff7cdcfd4df0a4b78bd2adeee9803c6f9097d8e447dadf1a4e63614e809beae3bbbc619593505773a50478a943dbf066c37b5b974aaafc93165288a7469a09c579172704d81f6b462b410081364a891e5ad1269357358be2cd93082a4730088d8a6f1d9b3b1d045723f8ac2b5016ef7d44f64513e7e07e800fa6bc8443ae0e0251e67fae5ddbfe01505682f6c838ef90f31547b04ff53d817511a2e237a1d37b1cdcb45e7ec2add0fd2461e030ad0af7a19a9c6"}) setxattr$security_ima(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)='security.ima\x00', &(0x7f00000004c0)=@sha1={0x1, "40a73fb38ed22dff01012f3a5d265558762d5b71"}, 0x15, 0x2) ioctl$KVM_RUN(r7, 0xae80, 0x0) 00:24:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950007ff0f0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507002000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:41 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0xc, 0x1}, 0x14) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x4, 0x0, 0x4000000008, {0x7}}, 0x2d2) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x1, 0x112000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x40, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x6, 0x5}, 0x0, 0x0, &(0x7f0000000280)={0x1, 0x3, 0x2, 0xcf}, &(0x7f00000002c0)=0x1ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x2}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000040)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\v\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6\xce\x9c\x81K\xbca0\xad\x9d\x15\xe7\x1f\xf5j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11-\xcfL\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa0\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\b\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00`\x0e\xce\xc2\x11\x0e\x01\r\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/284, r0}, 0x10) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x80000) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000480)=""/34, &(0x7f00000004c0)=0x22) 00:24:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f00000000c0)=""/104, 0x68) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, 0x8) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x200000) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x8}, 0x8) 00:24:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507012600"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000100000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507033700"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000110000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:41 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0xdfb186038293182c) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x420000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r3, 0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={r5, r6, r7}, 0xc) fchown(r0, r2, r7) 00:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507003f00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:42 executing program 4: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) r1 = add_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000380)="298f2726e277a0ad3f28e1effe10b5c3da6c9bf6116053e309ffee1621abc333f245767c6c628bd391b87d12d7581c6de20a024a95ede7cf190c32708f55451ac29f4815ddc6201ca66d778e156a8e1ce82e391e1a2027abbd94cfb85f5886604a998fe6ae9408f1a5e098e9e4467327c0b657fcf2be2fdcc7c3804bc4a91de357220d8a914c56123ea057f5dcd0fbf189529ede462d5c385d99", 0x9a, r0) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) r2 = add_key(&(0x7f0000000300)='\x02\x00\x00\x00\x00\x00\x00\x00\x15I', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x174, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$describe(0x6, r2, &(0x7f0000000440)=""/121, 0x79) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x7, 0x40100) sendmmsg(r4, &(0x7f0000007780)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000500)="3ef67055303bfffd4584133b395c5f8cb4f7a82858ba1a94dd93b25a124ec123d3da75e063fd85e87a0364ec4168ba039a07ff3a8e94b36d358fce9f29277e6afb2f5d7609087a2e6c39f1c896e51093d9", 0x51}, {&(0x7f0000000580)="a59f0ad3ed66d7235bc607e3e5060579f1c1f8397e4b14a252b359d6ec6107e56d2cae6cad99d8ebe8836a0aa667fe5e51e10fb40a6455002b1b294c7c935578deb612908c35c9faf9ffd15988424b599ada9302327ab014e65180a250b62083d6", 0x61}, {&(0x7f0000000600)="f345af5a500325d67a8dc81d3d6120df450571675f55efe7ffebe3008cfb44dd384a2a73a3f14882dc066a83a52899a6e8545b16760bac986713e57d1e7b3a7942249f84dae4165bc1ab47", 0x4b}, {&(0x7f0000000740)="3fa17589b6ad200106deb5a674210b2a5e3533f0ca2b06650ba8cdac4ad45700a11de5e63f25145051055d908899cf8e96bef49b7e7129c175631d44db4a362d600bc68a205935dad6bfd2969a087dae0c28e0f90dc1502eb137cc7dacf5eb6239c008f4dfe3b9ca8a8c62999e30832f5af7062b924058bdd470a22de1d72ed36a9e3f8814c95b6b292156bfbca1e38585ec1cfaf4153244e892a7b735", 0x9d}, {&(0x7f0000000800)="51f050b4bfcbaac32193c33cf0e2a875a55e9229b3fb62dd9194273be67e42517a669f593a3d7d4d00d380682162876b58f443aa3a171d30453d3d7da5866975690fa48da1b72793d411e2f8881b47", 0x4f}], 0x5, &(0x7f0000000900)=[{0x100, 0x101, 0x1, "2bd52639c86ced193743a1435e37fb762740131550027d2c52e717be570ea8928dd13654f4346eed8968ca05b264b54071062c5d400945df0a293fb6476b28a9ed1b7e3316e25c713220371f3dd7dba032aeae92da9ef2ea6a1b396f2c15b642eccb447dac52adf335471eafba652e74a504af06f61654bb4ef2317bee5e66d87a012e0918d4fb6a18d4a812c06f77a168706ce241a02e0e273df1dad62551b436c6aa5eb4f1250ec28bfb43d7c139ff18db25f4233e5627d81b91b2a7079ac9b6e2a3a1af23a9a6cc06aebbb47ef62f2153aaf1bd27ff784423c0e758a73a7ec772449620625898ab6533"}, {0x80, 0x10f, 0xcd6, "879ab6f9ed5c542e5223f5db76e384166dfa91860507c60e6f0298ae85bbb29d748747c619d9c5c49465a234f49607ef93b13c07a656fa8b9319cc7b322c7e98612d5913888f6a20c3162fc504295da1f58134ec4eaf7e0d260c96b9ac5907fcf50d054d7afe8322be9b4ced34"}, {0x78, 0x117, 0x3f, "f8f5a2b2e043771e3bad295787127948fd055124dcfd94e0624382804befef714a90c5c80c6f79dc41951d76ddb353ec9e9eccee072a4f675d18c899a8bcebbcb474b68794eb33cf12b9ac7aa33ee6f5043d5eb52b32360b92e61c3e09a038f93a12fe"}, {0x68, 0x0, 0x2, "acd8065027158ffcb01342a08eea08ae67f720abf8c9823c5c4daedea91bda24790618dfd38e6d57aa0438325ed88db1994510fa989b3a080d3811d0d7231a2d42ad8db15312142415eddaf1d548999941e6271bd1fa"}, {0x1010, 0x88, 0x2, "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"}, {0xb0, 0x111, 0x6, "254b6fa18dd3bf25de2d672e38f84c50d3ff3a3156ff500ead063e628108c8c9691f805a98f2f2103643bdffb16bbd8895318f970bdc30ac7fc5a0200855f2a2962c00b39b882d9ea57469e310b4afa9057c061655546e9ed0ab89464473203745c23c2e8664d3e7750d89f9a62e61637932b9efb2da1b4817ab3499ce1fa422b586ec351cc8563be596437667ceb44e9aa0d941e2f4d9b73f3a"}, {0x88, 0x108, 0x1, "e9a9b13ca5ba40889b4703ff4d364fec3cac07b77d1674324a56727d172ea7072b78310542d86a2b79652c8bbce14423c864b6e76444cfd6423fbe29cb46a36de217190d7af40f4789439af71aa0d1cddf2112aeadb5286ee910a8cefe71c3c19cc8e385eea613e7974628b688ce2ffa713c470d797a"}], 0x13a8}}, {{&(0x7f0000001cc0)=@rc={0x1f, {0x0, 0x1, 0x0, 0x7, 0x5, 0x8608}, 0x3}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001d40)="0c289878d948eab8e9bebcb8ccb74a9742b01993bab5a1ac4148935a94f663b2295218b57cc3c592dd436b7e3c701b557aa11cfd1dcd0462cae1023613541b52463f0333d386abe4cd22a1c9cf015d494ca9480c100fc638a51c8ef88dd872", 0x5f}, {&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f0000000680)="ac9dfe", 0x3}, {&(0x7f0000002dc0)="f5fb3762915f253837289aff4979125f4a28de512e14bed7", 0x18}], 0x4, &(0x7f0000002e40)=[{0x58, 0x9, 0xef5, "8ccf622d77300991c1896672d8618970a8ce3490c56816bf2cfd7ff3ac6cb3334818aec35acdc44345e3c75ad2215624f6ea8906fb3e241bd011f9e0c94514a6b23f194731"}, {0x68, 0x29, 0x7fff, "8f70e47ac3d8b2d289778bd1e6e44ca43e321115ecaece99b290d7cc37a83c6e6a870675cafdfc75f7550166dc762e4e7f1743d5c327dd9f729261b618e05428d758281f03e312e655c5525ce0b93ba6c03621"}, {0x68, 0x29, 0x1f, "c1a3663ac098a7303d09eba39655552ce1b4693b5a5f4d924ce47933d8128e405c678507c771ee91f3a0eff8c51c054989afe835ea48608c7f84e276a02cb23754b2ccb5625c84ea00e1ae10c7f6f2396d2d"}, {0x40, 0x1f, 0x1, "64e194adc8d2f5b40fe1ec26136e134cb250a216a5d1cad29bf1b77a23ccf69dbfeaca5f22c523174e"}, {0x108, 0x10d, 0x0, "1b01b9c495db88b1b337c3ed19cd5a4997347316122663dc9eaa06a35aa178e7092202bf29f10afd68290b9dd9ed63a072055858a73e14422272dfe06b410ef5d7cb7a13e6c20a5bc1c1c1a725087bd870bd6a2457c9dcb3388e3c1c13e38dbcc282bcd1f82d3032ce2a37656bea5ad1418e76e995a2d722a1213737a6c1ed8d464c6111d177bd2e45b0fdc301a531a06a20f6878b900a8fdcbb80fa0481ec9f8e906d0f63c7cb3b2fb252053939f2c894c7bbd39e3aa5ea75b007daa3c6ef34505143bab5e3fe1e25643a24de3ef0036dfd8c7b1c30985965d1ce8928d7e75e76ff7271ea88cab0a41b44e4fb3be05974fb0b5c97"}, {0x80, 0x101, 0x4, "97edaa771a494fa726e35784f268a58388ffadc2422a07b3e93b24df9222aa92c2605661709505d2cf90d1f31f511dfc46ac4c67e58784c42b548d20f627e0e8a1c58dd5695187075957c9251efab27264ccdd0e353dfd29f492d514511709833fb02290f49be39bc39785"}, {0x80, 0x0, 0x0, "62d0fa67db0a98a2ec716025ce3d046e3f9609b499d06fb64fe996b1b423ecd4a4332dd60e9ad8d51c2ac534847c064c4cddeceb4918624131251a844da148655028f9b6c38174f56c73fa8a70c405c4bf41d0fb3fa291bc43df214f81e39d2734e8bb10ac65c1a1aae60562f1fef0"}], 0x370}}, {{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f00000031c0)="ae5a7e715dc130be027ff7536128f763dc70f6b0b09d3cde5efbed0aa7b0fddc0e7069319aab0e22782f8e390c7607d37fd2daed86f4bba72912a4d7d8d086dff034c17e49bd01d5ac08b113acaaa49a626de4d7cc40c93c4a0c51b0e6a689", 0x5f}, {&(0x7f0000003240)="3517b678fcd85302526df1fe19517ace9d2b52a88d6585a2a311c6aedd2b56c32e1e71531a732439a21affc0396d9e288c1cc80c029d6d5045606ccd6291e6a7728f4f12d22a2795abac53d82b2678b1daf85ddf6e7c2f37d396ae8fef98cf41fede970335f2eea15e152991257985357524bfe1dc070a734093815ac7e1fae7dfe0c7453b19e7ad9a669664721c77d9387d316d679ce3f46f9ef11701c0aa29c347db867083e8867bbd74a5d270dfa95e005efd50c02b11e3bf1f9c57aab6e2a930a379310499329927b09125ade3e9143021cefc5f6532e57138", 0xdb}, {&(0x7f0000003340)="0ea3b119dd8961b833a42ed46f313557ae795c9966a73400481df339dd5d4ebfde47691fb726b5c448a6a33ab7cf7b8d8a30d5b4824e65a6506e4ca21417e171d56d3743aedaa73b28c8cdabc5afe9020be8e6d8b134b370d495cfa7eccf500b61be7aaa190eb84e0553d7", 0x6b}, {&(0x7f00000033c0)="21f0b1ddcf5377f1d85f0091e632b3ad30f44b97ab8c6ac2ac4b8b6475d0c0a321c5ac21580861d7b45882e33d42b0ec28aaac00849a1d394c6d2379d6108de835d1799dd35140ec13781d55ec306f4afe428b2d292213e3228b88b899a2ccc8259b997f45ed0d100aed8a34d259a960eeebd220da841ae34bf20891620bb8d660d91eac4e1d2b2deaf5095ef1dbf8abd1c73f9f2df351", 0x97}, {&(0x7f0000003480)="fd8d67ce2d48d6012daf4d971f407b60a9600e43ca2490e4b12debba5b9666368040705462d5c12b2fd5f81abdf30514bf36b04aeab5ac8afdf3616f5f9170ded5dea758181beb6144b05abd376982d04dcc9fa57c4b8fd936cc672f96b20a5f7986a87c519169b378459547ebe24b025a5703be70aee68dcbe6f486cc73c92c6252ffd831ccfeabc3e9c2fe35f82832ee2e753b7e9ece7889db40ca5b7c4bd89124fe3c02ea5ac6d3381c4ca61fd7babd68d942def07a1c79ec2c236312173b0ec80140099b7077f465268601816051c25b4e4831bc60f5dc985eddf04302", 0xdf}], 0x5, &(0x7f0000003600)=[{0x108, 0x11, 0x1, "ea55654924e3657fb75bc1fd8c16626747d1a3a3c587406ac748a1771d5f60b90c34d46c2c58e52f09802af0f7291e8fc363e6241d83e89c95708e102d49b7ab57914863ff90f1ba80770dd9069b93eff79e46585d61dc10628f731224823d5bf1d611bb50df83b487f905f5c938469822b6757ba10fd7b2a33e529266ced7cab3537d6cbf86d9a05048fae2654d6ea0a694a9fd92bb8eeb3b70bea19b77d431191a9aaef514ef123dd418fb2c71d8dd3451fabcda3aea68a0da616fb3f1ff0fed206e60cbeb0b53f5bb844de2365b5f6ddd0d9532feda00e02cf94840a4153c7117cdf5fbb4ed3a90bc0ea0f29149aecdebb5372b0f"}, {0x1010, 0x10d, 0x2, "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"}], 0x1118}}, {{&(0x7f0000004740)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000004bc0)=[{&(0x7f00000047c0)="23046bdff75f8c0d0f134428512729fbdd55a4e994f1fc6c686987c78fec1d52c962e399b978a6fa39949ab42d05431770dd7216b96121b44b0b03342dbd7db412638d79773afb90680f2b9cfb76707f0df0e835778b9440506ba232ee4f016a25c36b039b7d3e", 0x67}, {&(0x7f0000004840)="ce5fbb7db3d1fb0e1fb69fac3d24641f2cfe11c2b04dcfc347eac5a224f640793184e88dfcbc6daf2c8e8dc4fb06656e39a9586faaf331086b4020b501fd4859b389020db7030de7f10fbbe941dbea6d04c914879d0759007f1f63e7bcfa0a651a162cb8398be34b3cf56c0862d9886350b22f371e14307416340cc2ee603dd2c6941838", 0x84}, {&(0x7f0000004900)="bda52be8", 0x4}, {&(0x7f0000004940)="d65e09943f3eef23e77fb1731218ceb44e4666fb563fe297c4361ed7847ff9f87bcfa8849213a43255885c89085fae115bfc5add7051372d971f9d7a65747ea510fe0562653eb8c83d4e5fbcbb692e2239ee9f5fc43d10007e9e559fc19791956d3b698a44131d0c9b905ae6fe27c2139eb8e41175877fb28bd8f13da07cba6fa88087b6e88c15e92200e83d0feeb5", 0x8f}, {&(0x7f0000004a00)="fe96e36611e55a11de9b54e288cdef5539509ee0b9a1d927895f849f880fa22f08b5a28e18e9c342c50cb3f90f2b96b721f6bd6c726d57c7aad7545c12e84dfe6733233c8e549080c400c121496d6777b8ee842b903d8ba4ec74fd7cf5e2a6e804b131fc26e3c7a6ba2fc8ccfc335e80e9899437e39db752ffd93826719182f1d9aee17cb787031be7e41759149c5efc2b8b0e34a78d6a176d7a1fdc7755fe33295c80be9ab8e9cb4b8e75208ae3b97a157ff17da3987f25fbab11379336f8e83501", 0xc2}, {&(0x7f0000004b00)="b16a7fe9b331c42ffa60ecd29e95cea43404e97e4dfe4ea5a0a8b163bbb26e0ffa613f7aeed7fa932b7c258074fd93da49146e72abb64776f4034234b4bb2ca385c69417a19e31a2006a22f62b53601b2349e88b56d64f73f1dd1bf134c70f60c692c15c00ea19dfd97b4461f604a3f83dac2e456089f22926af6516dd73703d6d7c777d4984918177087afd78f5d48a5d18d76a89a3e6178ae7", 0x9a}], 0x6, &(0x7f0000004c40)=[{0x70, 0x118, 0x80000000, "51df915d20dcef58ec32e6dae5c9ca448c120aeb974c3bf185a962bac37a025bfe86bbee367f841087833a4accd4541f027912584447bf8bd9a60cd98381b500b84fe558939fd2ca2dff0057516380c8b67f0f2db8d194a7562550"}], 0x70}}, {{&(0x7f0000004cc0)=@l2={0x1f, 0x401, {0x3, 0xffffffffffffffff, 0x400, 0x5, 0x7, 0x8}, 0x5, 0xc9}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)}, {&(0x7f0000004d80)="d702f0c635c07268b1e8d71f34ed86f208a499f374f4e1d42550d30bcd54dcef0982ba6964619ac2", 0x28}, {&(0x7f0000004dc0)="ee68e4e02d46a63648e41bfb57eca75a27ad2c7d926056d77d835583169e6be6dc4461d1a6361bff6989595f6e64b48d3839f0a1390610e1df07bae56ff673be6c2cb306e020e99a813523c225", 0x4d}], 0x3, &(0x7f0000004e80)=[{0x1010, 0x110, 0x163, "b13f9ad4f4f561fbae09c75809b993b83080b617d662505a65bade2ac4d314904b83fc6b1642bb96ba679783d4854a30c51a0a5679645be9bd011755ba839970e72fc8244d96df489f09a3659b6f4cfa55fe890b156e485b6eb05ef1f7a3c99d18000a55e09cd87a6c52f65d8604d080d79de0df444d45539aadb6b4690f8a30cd4c3ea3d869c5683d56f46e69ce4097645df90fb36ae56f2809d03d8d255f60bdd981973bc8b5c9c1a817880e98658340eb869b93088d91900258a457de7c3bd1db7f55bbd8a8a213d5536b57cd6af28849222d52386413dbebd72b0d0e20f4850653bfdb3a5bc42f326441fa2a03cdfb4d4a0ddf1d9122d254b1a9e2fcb684817701d1f89b846aec4f99d7e47672e1df11c88cfd1ba4c6118b7c379577350a36790448984e6aca57ddb0b3b422ececfad526e383a12a54925be3196cd27202633f5304d9d4b53b7b1a22f344126fcc57c21492ee9123f1528ba0efa18cf5f55c10c2030d716ccf165ce7dd76072a4cd863cddfa9009f518cc4973e1c11dd778db020629545059539f2415587333c8930259da224a01f45776b0ec503112465e74801d6d51dffe7ec9d49ec030f567b53b9a58111b9097cb1ea868eee7802884443b87de2b479dec687d1af45bc61390454290462a90080a5039b892bca351cdb6069561bd92b6db874de4b1fefe3454458112113b8296546ea9bc8a294eda255483bb2f2bf4bd7c8089d95c5dd53a32cdc9eaefd752de5c0c4cd1d2d688d104dc6ee0deecec2dbe110f50691f5e59abfc4b23e38398771da38bdb76d9991e360b842539789814a3e2ddc183c2ef7e9191b58140dfe5f0ed0af065bb9f7ad210bf29609874f8cd2fa19e3aaa934452575132799665dcbd289f587abb18b9776d0d4cfe321659759b824486bc46741a391980799c6f12ec3965048fbd921a424b9f949ea3803e9bf4e1bd1aa354f0b7a64715317451e796d974a8e408fcdac6e7b5e0f851ee93375cfa8470d93bff9d9262522fdca2807138b7d3b3abfcfec2f8643f8016e28123ed6997105576c619979d46f1cc10148537789b26c707f4fa11ec6f04ce9c981ea0d5e73a96108182d8ddce4cebb7f51dcda20adf4744119257eab325a87a61840ba142f25ea975b16596ff4404552e29dc6b83b0315b1e96ba012838e7893feb7a33f7ab7e270678c30abc6217028ac539fefd6be14f3b379601bec50af92684c5e6a87ebd22bd98d32d47f93242c159d5d77517921df3e7c9f7a5bc0e7d12723af39a83bce9d77924cf7b752844cba29b49b3db53e366aa4e2e49ce06e7b2ca9ddb8438c0e48eefce6cd8c377b5cf53b4aef0b72372a44678a26756088b1ed90c97e270448ba1a84d1483db986bd3ac03a66e7641e7136868a4687b742d0be4006cdd3c36efb591d5423e51ca28d6d8aa9e55f75167cd149e27bab453ac0e835f0c075b57bc7faa35ac3470106f24533d494ed622163915d704659c782345e1863abd0f2b0d67b1e7aa7b094048826be44569d5bef20b43676c2c60f1a71bf9a12a5045bf2f8f72ec3b1339746a1f844a13e071d4ccf13bdd56b5db8e1bc00745c3c859b9c6896df56ffcae9c6dc7728102b87b4535f3c265321e16d62e607f6ad537de26e0679fd4051b993fa6e42025b6cf015d55f80d84b8e4a4fdc0696f85691b47ae4351f84c03bf9a9dfce8afd58e414fd84bc6af9ee7dd61386082ef0552e9ab4a77d4fba7bb2bfdbbd53837785502ad990df31ea59a02c5f1e1d16f3e582d2abcc6014c81e92e04ea8709354914ec8ace5132012169d0e1d208b4dbca67b9094c421f635ba3592f164b32d807f7f010583273676016a4966eb3a6815dc1ca180211b3db782934324ef8a47e9959fe68fc19d05016172a91ebd16c6fd58b65bf4c750ba2d0be6df871163c43723c41175da429a16f4b4fe1d60c78c06a314e8682565fda099b93a18383398da950931faddb68d158a88595190de1d323c3f50714caf769695476127bf4583ceafe956939458711910c3df3127f826e541d624d3863decb08311b0bb77885936e72d50c96d97ae7f9fac8ca83b471ae867dfcfe6295e499dcd6d11fb409ca68c67a7a7bb93e5f9ee35d673a7ade57633b02e8cf87607727de111f3b1abd846cb8f223710e23604f7adbb724fcad519710dd5dbd7f5d30f06dfa2d48a7a15c797acb1edc7be0988815c30961aa35243f7ffa78449bf9dab07be3f23cf2325fba27bc480bff158a2c8fe0a4a86f5adcb4db76863548b1aba5925468f4cac2aa170e2b72b717199999ca9b72c1947f998b4f7997a8c3cd5e5f4da3cb5040fa6fb609a90760accb7c26ee7f380bc4d964bfb8565fbe1d059d408bc3b1d5dd9b69d6188da9b409200e5ec585b577c987fdf9674b345498b8b8735cb445b26d3203dc72349f471a299fbc11ce1ca927777fcb5736dc9ec310376057f6a965285b3702b14ef94234665849dbeafda73e1489353dfe58a16c20de33940ee6a6d15efe8d2a0a1446258f7e0bd0b2b60cfb742d19d5c449c1b4601bbc533a664521e54d3715521d25f935fccfd84b6b65b92a8051dc5466694440ec304341c0b536e27c9c8482a801429f08704a8eb9e42ed3a19e0254e6f4c1f0620c15adf58f3f689025c9b7f154867ab2cd1f73364afd7f9e747eb724cef9267cf54d23ba891cc757a1833f99efdb4724be75f23a2a03f78bbd77d3c109825096e45012a1870479480e19b6bf5bc7ed65a357a665ada749fb3f517e3cf62904c2ef0d338e368df5cb6035a8528208b25a17ce9ca61bcee5f26e0dc0cb219d6a03a947b56fa03c50f5191bfa467a6a2bf18018dd8bb2631a2e5ad6a6561e1d2bcfc1ae51fd69ab86517423d36781e6f3426f4fd201f92663bd429a9c574ca9f45a864cfbce6d7571178b9caac0d0ab3f5815b71bf4fa099383d3b512408fcbeddfc9a6b95b1f7f738346dc46d01fa7a3efcf9daa7c3b839e45a7af7d423f71c9b6d69169c9c4a1a3405a9025d5e518324fecd7ccd2f22c810fa103277570a1b76b20c73cbbddec59e9193f8d93a0bf91be92b8468564be3106d7abfb7425e9a607a0a2682f3c6c63a1b379bfdfc02f0c7d26c4f4cb10d1e13e23749fec080d7382f807c0ab20605150f96ad425440fc2ae9d8a700512b627811ae9cd41265f5711a7bb89fcf7062e9c0c17053167ed1990e2287fc134799110bd6f7ba8538ff77c7d53cab3694ddce046e8706a5f3e1b7a955763c9c6f1a98fb8bf6828004a9f66af2385846f2b2a303f8739d3617649a07c4459a4e5e4e54c6eb2693993f0d29fa00c50812d4540a64512ae5484e61427bba494509923f8b8c14524e83c4075e773ce74514d9a821b7fb1b3b367ceefc597995766b538cecd162ed9f79a4533fea3173e01f4d779b82503204d6eb6ae87436c22a275087cabb57da5f6d7f19bd1f1d4890bcc472add9b5a540cc6c4e226423f5c5c4e000e01a41850b4a1c0810882d4ca83fa797216f7eb75f46272c030926b3e0b98a00ed5dfb08fa32e6a7cb7fbb1350911ea1dd9045a73bd2c6d74159799f5b400ee91ec13dfd81eb3b883fde104da06d5bdc1af2a742ed77040e5aac423c9786aa3490c41b515669353f10a87c8d59a57ccbd19c55101fa20b2a4b7254bc99153452d884e00525b70db79f2f821b3f9d146e9fe686908e3a3cfe262b87d9802e43773ab7ceb68bc61a0a5e5c60da20e0c2f856cdca4acb6df2f92e52755c07d77b157d4b60c19006d6c1976028357c4dc36404a59c0efba92c99d59a5cf0c281b986b4d6d3753a0094c96682dfcb74211f88bb3880c4dc59e8bd16b6fac40b49f5a9cd28d089c837e808bc8c7abf920fdf14068a1d9ee45dce4106de04fa7bca08b79131a2f50f69629ede107df271bf7e28928156d443052b0290f603236a9b752e0e5750fdea996d26524b7ffc9321074804555d3bf983dc035bac2e5cfead8c6ebe513ca5026e4e3d3edb284cee9d8bc04426715ea696655f29e8507ddf8507f4dd7f382a2384987d45c62bf48b0a771e129af5331ba488a6c6c1b77f2f8636257976de4015c73ab3c6fc683310150b127ca83fd55b7ea8d2b4b3d39d768ffb5af3e1c44ccacf16e863208acda3fa891e1876befef8a76b71c85ca5c384da9c182bf0cc30a73ab75694d660640297d5c3ea0501b9bd8862d74421cc25d40761aa15d08bcf47a0604735529d3fd9e5f21760c8430bc04426e4613621f12be59bcbe66877bc1889b10d2b3852e51ac841a33ae263a6ccfad34a1214d2a81ac14649e4e95bb542c21ee821ae3f94e02e0d2307c3fc90c957e78f8b754145c07422e86245db6985158ced8b88f8d69ca544adde3d099bec299a5147658e0906789e791d3f2f6c918c3e30dfe4fca00efd26e584222773fcea5cd9d6be66873499f396df4f97771e562cc785d60e57ec8a62511721b8cbb71ad595600938ffb9bb4a9cd698f9953e91beb97b30402c42f25bccf649f2e3efd6fa625bb7dc24e3d74c62a3f87be3b5055e0aa04b77e56098483cffb1805a6ae339de811bb0e193460f0f7bb9bc8c80d893c034a5fbed0596ffb778df1b563c3a998e99aaafa51754fa6f62c18ad3119706bd458a6c9d3eee4aa07182767366442386a887291566d34ff67a0d579da761c43acdf2e047ca3a4a028265ae370e2a7f349e1c724aded5d8db4bd84dc5c7b15fa41b0634d354a08928727fe4bfc6545693cb908273a1a45dd6df803218054ec87861c45800c885a130fa74137271bc8fcf27e208663b842c343cd420120d6910ae2556bbf9a83ce1f8eb3d8a91fbfb598874b3330d0578f921a354c7bb39055714708955279d457b8ec348f6a02ca3f1e7a1cbae1fb24ae7384c2f74166888543f2886ab672e5af65efc982c96883dac24cc58caa76b97bec2b2ddf29621a597ffdaea4fc0f69f588bb8ba8e170b28aa47740743727c01f1f3993d2be6265222fcaf2478539fa07313e520bf827b7c09ce19eb4df177da0775913db21ead1d9bb75c08eb2cad3c9639fb7bc715260a38095b9a17b44e2be55fd20d34f5d76f71b5873c5b4c30d0ed39a48fe30e0aee96c0db3cf760b8ef6b6f90ea3cfc48776182cc1d759c3ce24897b94227ff13d999db8d346d73c20ecf86195529553490a5b17d6677e89549a734f83965e969f4f99c24669b7b6dca24443dc6a610a787e8e5106c89d0b24a25d75eacf0b3e4d4579e79ff925ba03bbe99cef2b4882d6ad4d0cc9e6cbd1dd8306c5b74a37000c4612afd8f0ee00021f1d6ad94104bedb50531fbdbafb632cee8d6e36ba9a9b1f73af70912e9087b413b2e23b24fcda9cae12578b4348665d7cde83d8c201bbd20b47eb48b485b2aeb03170c60047487d987aa1a91d0ae89c017062712981d02e6fb1cd30de97e72bc4c11f3b80847edbacb6dae57871d4b4ee35d3eed64703071fe0b5f37e272a12a3f4ffa2e63f5a610abdc4b47da364f0390ddf1065da2416cfe0909f533dc6f8bd8c2a510e0ce60d81366cd6d7c37ad0c1151ebc78c3780b4c444cdefb155bd6d25f30c45ff2c9bc89915a35839ef1cf6f296c321866c64fe1bb37592e02a741020055791c5f502ad4cb963d2ff5ae1416bb80de2642644bc39fbb3d404a741490d6c417b86b0da11728780b988b61ce219dc1338260b46473d79e42fe8b42f2bf08b2aaa26e3af080bab805e3a864ef7cfff771a527b709ab283f126d4e6d04d101917b1a288a4115fdd055ff277b6214a00af38f78cb233fe5302e438"}, {0xd8, 0x113, 0x4, "99e6d60622cde01eca4804cc81d0146f97023f74f1ca031e3d417d9a6ad48ac3526ead30d78a8113143e2570bab0de71afdfc4c7983852115678211aa4240abfdc235b11f421e01806c5d43e6c2607d999e16e01e522ca63926ce35e1fbd64a7f2694c81283ce125aaa6c982f053091a328974529bb9f2df88658280ff1ecfe4c580e7d1ea2f1d0dbca8da487e90d9ce9c88daeed045c269b0c8850d363799b6ea6db6622abc9af1e97e05a6a665f0a5d3ad96ed1c35f581402657a3ba48cd932e2c"}, {0x70, 0x119, 0xa00000000, "0bb706a785aa12badac10c909ef12ca27fe5456a7e215de4f2be00b96c8dbb22a24d053b5d6c1340f399a7f7f795bf83e441b765fa2fb19b6a0b2e1e67358cc35ab1fd90f0e8f02b49215af96cb71b4e79df51bd7af4a8772fdbec257e09"}, {0x48, 0x107, 0x5, "b56d172b4a85752f38b7f859f9559846c212285ca033b2c127f1bbf9f668fb73939c6518b88d47b313c2a4068fc688026e18"}], 0x11a0}}, {{&(0x7f0000006040)=@llc={0x1a, 0x30f, 0x1, 0x80, 0x0, 0x1, @remote}, 0x80, &(0x7f00000061c0)=[{&(0x7f00000060c0)="6f655789dea25f3be2cf89dd04c69fa9e67f4dea294df1b1e10355476a08f3ce7b01b44d9a6eb84d7b2e3aa614807a0816dd8b4aa6d300b93ee851ef270c51eb74d7ea792927adcbaee2a1e0c79874ab1f5a59e0fe1061b903c00a58aa6d9b1c2dc59e805552e73b1f401d522605263ccc6dfae8146bfcb4c08dbc16f5c95cd5b3840b30bbcbc92c7f31492a1866ca95fbba49115c707263bca8114f23777940f15971870997bf1391d4aea1c98f487dec053d30ac442aa20a55d6822bf0e8d6b717db827d01e16cb64c5bde8ed58c0a95f240b9dd6c84c0d891001935db925ee56ae43a5d5c23abc4e47b81908b21ab5ac48a15a6", 0xf5}], 0x1}}, {{&(0x7f0000006200)=@pppoe={0x18, 0x0, {0x3, @dev={[], 0x18}, 'ip6gre0\x00'}}, 0x80, &(0x7f0000007700)=[{&(0x7f0000006280)="5e6e917ffcaee9613b5e3de17efee5dfa66ebbbeba1030268a9350043b6a346b853a5e5fd40afe16aab7c7af63e2f6a525afdf5f7b9eafee3343b33aeca919ebd951f658ea97f90b734b96b38c0fe5a63154f9a2d871d8defd41ddaeda9d6cd74ce4b2d2d5b8ef08d2a8d5a3480fc1f70fbad114a14d0510cf61577ad94bea4b9dfc0a27c579885ef758cc18b72ab3641f974af363706827790a42522309fd3986d18f4a9d2a887d047e0ff60c86bb4e49365893f8524f9130de68c2e9c31f898fcdafac9b06624399d1b17c0d79f8e0ba29fc28cd7c371d8151c87af0447efcec5851210089d73b74683fd923f9c0670dd0d8cd469b37f8cb11678ca7d2c451c61d9410e08ae07b4f02f3e06fb4b7900bbb0ec532bed5db1d3455a5dcf2928245be2748066e24f3cb9123168c3dd84db275e5302264f8d4bca87f4c12febf030b1f50d7446198c9b442176f66bdb10f5b3ea980368cf734ee42d473b853af8e8cb1a1e4cb25628ac000972519e2913a524d98ff6d44703c8300e37bb8c889c90dec451bba744ebe4fb8b347a2e59dd6bf75e78451ec26530cd9faace04f9e5f8479f12bf173d1212a3a149afc91a519664b6f0fa0ef11c49c459b621d11acf71ab73141a7644e0351bd9b7fb7b320f53d14d9df6766cf8ec2cb1adb9473448ddb74720e853def9ada2962189d67bdbeed45c9d92a9748eacc4917e1a2b3413d53130e097a8ac6d90321e8eab798bb9a09ddf9178de16c4c319c5ed16e4440c226fefbc8a29e4296b3af356edbb784f167afa361a66291cfb7af0ca4a6175f83a77600fbd66fb739190fd61f5af7aeb14d958aac7f08b841c33f188564e5a00f7dedbea52f1fee33932c2453719e3355fc476f5bf5fc4ced1d1004d28f4e4e1675b1ad6d0a6b5a1bf34bb0465eae6eae78ed4cc1ba6a62810103f39ff0bbd07628b6cdd11c4bf8999fa38d87bcc5f5d0b37d1bca9dc952cf6308e8ef386969f1fe191e45c78ff7e36d71e9e371de08bbb2ebcbd28fac751e65a83874cba2febdf1473c9e58efc4c7e68fe4d20548d863252667d67fee6469a41c7c86219ba143907c8f6703b3144d69dc4023675d018a73aca6065bc91cf6b86be3d1add7224b68b88a941def25061ee3196b4b6724fbeb2326c844dabbc4e77c2a25b359b47049b9d0a4ea7d9e0638f689309d667f6c54804446970e68824a809b7ef21e4974cfe2a66a375f830844b62088391c76acca8cb2f06304fa0b68e8d2004504207814239076c919ef177e40279110679b008c5be2d0d1024017c37397c3451eb179cec8c59122523417c319725a5ca1cb2cb5d136045d137fe6db731646db6b5382815562e7efff5312d0fb2e02d2c9a4bc3f97198b8938cc7be450eda1acfaa716a8f7078647dd6bc4d618f0da596879be33d8cb8d8a7f43d1a1e13bc421a4a75cdd1751594a510f8fa3b9b77917c7b4078e008b30561577b092043e5d3513551b42a5ed4e6aa9cc6eb453eb9b85cdcc5f5f4198f1fbed7de8d139beadde8ff500705d31ac05347496ee4995c78d7018a1b51392fa3b32686a5050d82be3dfa3d27f6289bed15de76ba3326a5316adb95252c8fa334ca3acb5a5a2888fcc7ade9caac654558fa69aaebb9d57adb8c9f58827b88536d95be9a6c78be4cda86fea43768c56b93f883b59269a93f2baf3cfff0f58754499da94f757dc9fd73ffdb14919737666234c46121300c788e40ec050caf1b157e33ced7023d4cdbd5020e0196eec0423f7e453bfc695964c501aa91f04f5b9c1f0aa5f6dc7cab7e09629dfa17400aae8d88218e2742f69f88917745bdaf8e1ee239c2073978ca8f0e281b9b221ad4553bf4ef8e4227be8b03b3dcf07060e777cfadfc73116ecc7b63d848bbea79bdff1e1bfb46478b50bc4f5b7f31b26d834b09a6a9d19b26acfb6632eb4a91d457a95ad507fd14790743f89e46a177f2668e487ed549fd78704172b39f8210bdc5c172372a9cb98be0dd4f6f176c9bfd08e992f4b6a812be5c30a076c393e41f75c6fb47761219d50bb823427dc3fc4bbd3edc7a80b86dac219851004679ee1b5c3aca41ce2d8ae7764d9f3b5a97cd5cc64da6a1e58affbe5000c8c0486d5745b677a70d3546bb14a65de25ec206c7550bcd52638fc17335e58dc6a029377e8c986db1425c123863a24148161569472ab0408fb5869f4568a754463dd9af6b03ce0d1ee77aff06ec68e7ab9863df8493a38cf8b8bc9dd34101d94abe25378ff0e94be5a66a49e4a06c6201fb742be9773296a7024915646b4792d689d13d03278317e02a9f941d26ae4e77e173643a9a976d1ab240112d686eda952de00acbc6d74d38e545c08f2c32289e5f7985763a3ce5705a15b7b04576bec63ecf1e627f17c94cda4e158cbc0ad507b200def52d4f298a21ce2b272757c9f61d8fa5ca14e79a54baf14afb944163032ca56b967dce80f4f51d2887a36063153d15253422921f38005cd134c5393b9d5818cae8df99140d65a791bf795170e4d102f97f9cb09fc5e629123b1c65013cf3901a2d05d0e1fb6a81c18002612631132aa6f08e9112854426b7cf41d125a52242e64e86193c30edbe8d2c53c83de9a9aa0abe54d5d30b4de4b9072cb5c6dae5402586db8d08569bad36c6801e75c4afe58b7be415b02ec89070585afac0344ddf8edc91467551b221d91cd7b5ac66838ca58f0eefd361fa409248ebf3629e722e507ba34e96fb3568573f4ba7a600e70b63ff24395af17ba05d3300f1c61a4570717be5ca216fe6bbe93c29a77107f2fc92b35cd6a9fe822ed2942e6b50584cbf079820a3301939f4eec36bd5c42692bec6296c3f30c82f91c6b46880afd22c99b1224d0c2513fea87f9f80f5e9b250ec0cea6e96946b8387b176cb2174c362a4ff452ccb9d0a46ae96ce6cb4b611737d8e3579309b33c9980ca9065ff0519bbaf803b6cc47c47acf16662f5299f5fd9f9a2bf50dc04966247991c2b1aa8cbbb0615fca2238468b0f57eeecba7c66f42cbeb21f394e4aa2add5aa78c1568bda093cb63c349565a567d5d90faf30fe1ded4a929a9e656ccca138b575cf6144da631149229be89c1e9813d34ab53e10c3b9ae5154ff344d557f4d07abada9917502e4db21cad05d4a9104b87aa3c85ffb7273990f0daa4c0f7ac91fea781f627b67372d5ab9e15c4ea35c3af309008e38477ace7f6ddc155efa741af5947413902824f06641bf9addd7420c3b2756ee913b0c304a16590f5204252b9a660d9bb33fe13a298820c629aeaed8de85279243186f042cb72057fb919a2b0fcfb7e2b6ef13fbf40a359040f21fb01979653d76c0ef1a95c60448214c03ebaf5aefe20ec88879c5190b25e107d3f2e343968b8fb5300e1059e81e6fad3a7453ede770071e49c4930124b8dc743dd80b9f0279b680f9bb575ec9e99c5d2727aa35546340f43bc0abd6df431b49cd8c7da3a90aeee511761f05972670d7af409911802360e93079de5d45cfea8c45dd1611724987008ed8f0e1e9a8fdbae95fb33ad8162f8a5f04ef745f5c7de89790c586dea2ff20e6461d2e1beb9cd0fc382e659772ac98c31e1d0669117db629cfb29ba55b1f04275939b1333b3b3b0a430df1319c6f12b6f1fa6b864fbb4b405ec31b6df09855e33e00d386b2f4fc32dd442edd64414ab09fa75cc05a5cea550600d3e65a917d08703b34d2552217a67830c95b91d737e33c26cae9f2f090eb84d1890d40de1ba2e70069749ebda28eaf14680709207efa5cd9bd643ebd066b972919ff5afd9543c2f53e34fe40d92d4427fbe0ae24ae84b0779f1344a8b2c3467a442b41f2eb2020ce7c10356794db903e283064cb5044db98575c1235d8c68bfb157884502fab5fb32ca7f87dc036beae7cad5c42c3b6bb1d96479f10c393f90ee438f6037a1ce9a344d11c0da69e0d5026cbb906006a18d205ba3a73a0b436ed6c865b2c5aea180d4153be90cabdc56d6c3d2a6e03df59140a1e8dcc3fe384e6c6413d0ed2abc5ffa4b785ca845b2ac6e28de967cf834df7e22fd556412735e644ad05bbcc19200d83622f54c1054a9a74f78672c67d6ec1facfa02c6423d1af97b7fcccd3682d427fda3bf725bc85faef14c070cf45dc7f312f9e3d6c8b5d244c0a5a219f831713fa156fd057217b66e0fcb64a119147dd2ace85e0609936bd9d29676f13c92a867be74490ac9e62a16a362a0a8b54f549d9a2014d3b87ced3d4a3c019fb5e65358075cbbf705d1a79d2958f92a9e43e50e7d5746cab98324db0f653dd4c7f1e19e77fe3ec37fb3e2e534779ea3f3ac8b07287fc55db231bb10931ba9e1776892e792c3b1222f14d587d9fe7446cd4b87553014e4ad6a7d3d6efa5c42aecdcd03b0db30c38b59fa6bfcedc70b75de79b3a5ef1356e522520a1a5857d0a5e15a06c03ddcca64279559b8dc7499e7eda263666a4efd57e90c7e64fd0168a9a1fa72ff535fadb36b721c2d124170f83c55298c8bf858737748f9158efbd2663fd46aff5e4149a6039cf8bf1a04ba4d22f2a73e454625a255d224f5d3b8e234291cc7caf8ff09d86e8da00092ef09f524fefe5607ed7d57c317febbeab0445ad62655ebe685fa3cbdaac36eaedc44f04582812a9bf32c22b178634793d8314e66cd96c85d6265d99ffc03e3e5f1b0261fcf6bd3d2c2896bf8e658259a54a651a6ff934d0b7ef91216b6133e17e0d0ae2f30ed07a8b6213d8aeec62c0f1e006efbc87e51d5b7f0e71954640743bf887e1a7ea66829cc3dfccbeae8af8c4dfead4478ad01b6b0edc0c5f85577d6e8b7d6466e7a6264e417d6a8956b211e8e3948886e7778a2535ba83440e24136a3e1a69f333b13e83023acebbadf8141e32f9bb49c4f7505e7a19d2624b621f32478ca9a1f538dfcb3a55c196101429075c07ce022cbde603a9335f6ff7a736e3be44a0b153c74c4fbc54c1688861b7f5fbd4078f825fbf9c660d91f22c5f008f1bc38b89d1968e5c95bc2f290ee831450f53c22b6c2228098f89e3967e77212f77a4a62e4a043b0bb696e6c0ad6d57a5ce3ecb8c73729471bcd525223fdfb873afc5ba0fa9c2d6d1f52b28f04f35d7b187f86948289f46364ad270f328cef8509489eb2e1d6fba81c82aa6b3d30736d80935070fb1c1d666890bcb0adcf1d272af1f159d07fd5817c0da0f28009e99380ca2f3ed8550d26150646eb7d1c452092d5069310c4a78c8601c52571aedc9d7952af73a2e31743abbb7ca657b7cd484c590d1468413f885cccc3f0313e0f79c4ca5924a1df9069c718cdf1731addb72a5dae1e4389352c5d927c4274637874d7e586457d148fd472af31bf33b6985cf057f996a184b1f4513ad721193853ebda57fc0c239d77aa2e705f5feb500987cf9d182fc9f50769a63b4e715d5dbb2bf52ca3672aae9942ba93d7fb0c0b68c5845107eab71d3e17c473906950dee7accc95d381f6e683b2685c105d5273a13abf09c40915ad24e88f865fa0727920c8b757af6c49a9335e0df521a76e2116651ea7b320dbceefdfefd389a309d26971cd7b97f0ec1d8a547b8f245605bf20c9642ef9602ce0fec348539134b1aa2c642001d0cf1261995f7d6e1a1a8a79f19c26f86d2d1a0a0ce381a887668f07431b46fa9e85c169f7f0761c92bb45a815f8309a10c79e034475809ec1625d95386cf172e61d95bc2b888706c6bc24b69a1b567d84ba8091fcbff81f9aeb9eb4f77c8c8b0c96e617899995ef60fcd83b2b7863a5f21b5fb0992b508a89c0602de07f484b7d3bfa", 0x1000}, {&(0x7f0000007280)="fcdb314debd1cbf6104038b8a39f73940806aa6081288bc882c4c90010b31705779d92b32f41e7d868044d709a5ecb4c0e2b4fa04bd587f130fb2b7bcb382dbde0", 0x41}, {&(0x7f0000007300)="87e58c184202ba930d8c5aeec77c622c7d439b72490a5f7a5805150bac4225aca0045aa46e281c918d1a8baaa72d1e2949633a3849eac27ce9214363716f63c4c1a13035adbfb4b2a50e0ab5e227d9584afee7722f7768694a377074743e593536ac2e6e0c37536e0597eb74fe160e13c42f3b95c260d9e91dab2a5a7cc6893e7fa2b5cb41f806f6e13d49b28a4c2c386a0154136e05f1269d97d4a87b75c5f2a26bfc44d6999f74d726a0e66559df913be8b4ef42bcc993fbef1a61431d7bfdda3de50bdcf7", 0xc6}, {&(0x7f0000007400)="30d4b3d3781ea6b16346a2dc9785b6cd3273e54339c5dd161a857b207c5a6b85c2a8693f4fbfaceb822cc1306511700d1209f9bc6d8a3af0555d568f482af570d2a1d3f92e9e1d2442108244e569e442a6ce15829f776e37e6091fc450f51798961cda7e3dab768b88b0273941aa127711cdf306b78a709ceb9df9410ef3d8290e09d2ead00fd53de169e78d5c2bfd5bd96c18ab03ce477960630519e29743383a176048fde26208a01efbeaa3283f8c90ec6603226c14d3e4f8a0c3bcc005c91c6f72ad", 0xc4}, {&(0x7f0000007500)="e9ac06d6cd12c718587b9dc620a467b6b15b9d7b0bdc330b31aa7b565102db54f9e687423e741f61decf161602f814253a50e0e58a538468974065", 0x3b}, {&(0x7f0000007540)="80d99213aa", 0x5}, {&(0x7f0000007580)="14007defb85cba9a34425d4c7f9c2060510547caf26b04de2564920e9711062c1241830f5b3e58a04c97e717fa906623817121a73d5a83462eeb68d1d4a5a20d83259dc6149eaf2b7c8aeeef3921c27d9d0d84b53bd71c2dfff997c3ae8be48e5106caaf9c947811f1dab77361192b86b24571435ddb1f5658d64524dccef56d8abe1057cce900aa9797bbcaf9abe947f0398ab6c734940d304b8b15d3ac10795df0484e45c4a26eaa826663448c240635b65a183a9393214cb5770e1d428a8539aa", 0xc2}, {&(0x7f0000007680)="e0e110d1bddc19e2b39581c46d2662317fedfafcb1b499cecdf274457e43a11fef94aa3712012754937a92e225f9ca43142c110bd95476e5a245633ca214c19ae1628844007c48deebcf84b8f63dc7a143a9e6d29e43b15feea21187ee9d1c726de0cad0c8d08e536daaa6a1e96723f5c197383187809c073d4d30b67c603c", 0x7f}], 0x8}}], 0x7, 0x800) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r3) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000040)=0xfff, 0x4) r5 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000000)={'\x00', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0xdbf02aaf6571930e, 0x0) bind$isdn_base(r6, &(0x7f00000002c0)={0x22, 0x7, 0x3, 0x800, 0xfffffffffffffc00}, 0x6) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r7, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000004d40), &(0x7f0000007940)=0x4) 00:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507004000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1370.674973][T13925] ptrace attach of "/root/syz-executor.3"[31473] was attempted by "/root/syz-executor.3"[13925] [ 1370.701755][T13928] encrypted_key: insufficient parameters specified 00:24:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000140000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1370.724640][T13928] encrypted_key: insufficient parameters specified [ 1370.760780][T13930] ptrace attach of "/root/syz-executor.3"[31473] was attempted by "/root/syz-executor.3"[13930] [ 1370.769574][T13928] encrypted_key: insufficient parameters specified [ 1370.804321][T13928] encrypted_key: insufficient parameters specified 00:24:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000000008103e00f65ecdb4cb92e0a60044a000cd300e89d6efb00fe80", 0x1f}], 0x1, 0x0, 0xfffffc5e, 0xa00}, 0x0) 00:24:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507024000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:42 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='(\x00'}, 0x1000000a0) r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x800) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080)=0x1, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x48400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x1, 0x17, 0x80, 0x3}) 00:24:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r3, 0x23f, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x02'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x200, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000495}, 0x20000000) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x10001, 0x40000) recvfrom$x25(r4, &(0x7f0000000140)=""/86, 0x56, 0x10040, &(0x7f00000001c0)={0x9, @null=' \x00'}, 0x12) r5 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000150000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507004800"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:42 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0xe336, 0x4) 00:24:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000980)=0x9) r2 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x5, 0x4001) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000240)={"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"}) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x4b02, 0x0) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f0000000180)={0x9, 0x8001, {0x53, 0xff, 0x2, {0x7ff, 0x80000000}, {0xe74d, 0x8}, @const={0x9, {0xff, 0x2, 0x2, 0x7}}}, {0x57, 0x7, 0xef, {0x7, 0x2}, {0x7fff}, @period={0x59, 0x1f, 0x0, 0x80000001, 0x5c6, {0x100000000, 0x3, 0x3, 0x7e}, 0x2, &(0x7f0000000140)=[0x3f, 0x3]}}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r5, 0x0, r5) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000009c0)='md5sum\x8ceth0md5sum2/cgroup!wlan1nodev:]#nodev\x00') lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r9}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={r7, r8, r9}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000640)='nodev})\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000740)='9p\x00', 0x54000, &(0x7f00000008c0)={'trans=virtio,', {[{@noextend='noextend'}, {@dfltuid={'dfltuid', 0x3d, r8}}], [{@smackfsfloor={'smackfsfloor'}}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r10}}, {@euid_lt={'euid<', r11}}, {@fsmagic={'fsmagic', 0x3d, 0x40}}]}}) 00:24:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r1, 0x0, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x10000000000003e4, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="233ac7f5f5de660400070011ec9e92187fa218a1c1208e4b9981176e34e69ff8a171c8b4f60cc231fd831cda282a75f8dc0fea84fa4f652ab233a4a6069cea03ec85b5f71b19629688529e5ce654a34a767cf7490687de00007f6d00a20f5d565e1efa091b88da9499", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x5c, 0x1) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={r3, r4, r5}, 0xc) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x187, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="f000000023002908fdffffff0000000002000000024537e72774aadef60104000030438b2108988123621a002f2f1ff4cde2c5d4cfeb1c97a2127c556b6e2e1e1d0f16fd7a0f4e12a980c2ccc8bfd26dbef47dbed1a73b1938d0bad3d436fcf40a9514000100", @ANYRES32=r6, @ANYBLOB="7000470010006c005d747275737465640000000065b7e0e5fa19c0d2b00147b08933c835e118b81b6fcfec9d9fb55df319f01957eb1f1447a2d915e7e811d335396eb2b14ba49e6eb41452a4bea79a5113e6f974cdff3cdc40f948a820b51fc9f8f2649e08009000", @ANYRES32=r4, @ANYBLOB="0400620008009200000000000000"], 0xf0}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 00:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507034800"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000160000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1371.368038][T13976] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1371.404120][T13978] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[13978] 00:24:42 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb\xd8\xff\x92(\x1b\x85\x842&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/279}, 0xe) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3f02000000000000000001000000000000000c416b000014001462726f6164636173742d6c696e6b0200"], 0x30}}, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000240)={0xf, 0x1f, 0x1, 0x1}, 0xf) write(r3, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x8cb014c850debbd, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x93}, 0x1, 0x0, 0x0, 0x14000054}, 0x4000) uname(&(0x7f0000000040)=""/77) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0xa00, 0x5, 0x79eb, 0x7f, 0x4, 0x8001, 0x5, 0x1000, 0x77, 0x0, 0x1, 0x6}) 00:24:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507004c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1371.490300][T13976] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1371.504919][T13978] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[13978] 00:24:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = msgget$private(0x0, 0x184) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) fstat(r5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000440)={{0x7f, r4, r6, r7, r8, 0x52ac59b8728d8d8b, 0xe414}, 0x9a7, 0xff, 0x5, 0x7, 0x80000000, 0x741957a3, r9, r2}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x8, 0x2, 0x100000000, 0x87, 0x9, r2}) 00:24:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000180000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:43 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'}, 0x10) 00:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507005400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:43 executing program 2: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) setuid(r1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) getsockopt$inet6_dccp_buf(r3, 0x21, 0xd, &(0x7f0000000200)=""/64, &(0x7f0000000380)=0x40) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f0000000080)={0x0, 0x40}) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b4469723d2e2f66696c65315c0062831d2e97901d172a534c0883a04f4d8aa9868c3405f7443dae237981cd3cb6f4fed89d0b8ff683c756652eccc952c11cbfd7432b80d100e3f77f9939aaff2261bca9003550068964d6dcdbeeadec05a61deec54dc782142d26496d8765295d2c9141f8aadc6931e6f8d93f5e245e4d6048d562d6d07a1138ce9cd355a61320da5b47dbd1"]) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$TCGETA(r4, 0x5405, &(0x7f0000000100)) r5 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r5, 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 00:24:43 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r3, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f00000000c0)) 00:24:43 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80200, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, r0}, 0x10) [ 1371.907277][T14012] validate_nla: 66 callbacks suppressed [ 1371.907289][T14012] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000200000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1371.982693][T14012] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1372.005559][T14012] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:43 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x80) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0xd13c, 0x0, {0x2, 0x2, 0x5, 0x2, 0x7ff}}) 00:24:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1372.067794][T14012] netlink: 'syz-executor.0': attribute type 23 has an invalid length. [ 1372.099508][T14015] overlayfs: unrecognized mount option "workDir=./file1\" or missing value [ 1372.141266][T14015] overlayfs: unrecognized mount option "workDir=./file1\" or missing value 00:24:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500061e240000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507015600"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x220101, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xa0', 0x4004) getgid() r3 = socket$packet(0x11, 0x3, 0x300) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000080)) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000016c0)=[{&(0x7f0000000500)}, {0x0}], 0x800, &(0x7f00000003c0)=ANY=[@ANYBLOB="75e9fed133687e57f86d61736b3d30303030303030303030303030303030303030303030352c6d66745fffffffff5f6d756c7469706c6965723d3078666666666666666666666666666666662c7569643d59ba29a696624b", @ANYRESHEX=0x0, @ANYBLOB='<\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b6673666c6f6f72810000000000cc22ed5f6d69745f647372656374694fe271"]) 00:24:43 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000000)='tbustedc,\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x10) [ 1372.400345][T14047] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1372.438452][T14047] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:43 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':Q\x82\x94\"n\x00'}) 00:24:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1372.478728][T14047] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:43 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='\x00'}, 0x10) [ 1372.541041][T14047] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:44 executing program 2: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r1) io_setup(0xac, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) io_pgetevents(r2, 0x10000, 0x9, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000300)={&(0x7f0000000040)={0x8000}, 0x8}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) socket$can_bcm(0x1d, 0x2, 0x2) stat(&(0x7f0000000340)='./file0\x00', 0x0) getgid() getresgid(&(0x7f00000004c0), &(0x7f00000007c0), 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e0000002ac14140000001dba00000000"], 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000900)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000002c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000040)={0x0, 0xeee3, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x36cc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x24, 0x23, 0x829, 0x0, 0x0, {0x2804, 0xe00000000000000}, [@typed={0x10, 0x11, @str=':%/ime_type\x00'}]}, 0x24}, 0x1, 0x1c689, 0x0, 0x1cabe}, 0x0) socket(0x10, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="6aac6d", @ANYRES32=0x0], &(0x7f000095dffc)=0x2) 00:24:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000300000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507655800"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:44 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, r0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="cfb81180773154ad6f14df59ef4c932fc31b5f57af5bd98644508227fdad25ef0d916cb357c9b719fc127b5b53f1c5e6453e96eedd5fea92d0", 0x39, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='keyring\x00', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:44 executing program 3: connect$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @bcast, @default]}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:44 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) eventfd(0x9) 00:24:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000003f0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1373.025346][T14078] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1373.035564][T14078] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:44 executing program 3: socketpair$unix(0x1, 0x508f41486f45157, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$sock_void(r0, 0x1, 0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) [ 1373.096472][T14065] sysfs: cannot create duplicate filename '/class/ieee80211/:%!ime_type' [ 1373.159130][T14065] CPU: 1 PID: 14065 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 1373.168384][T14065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.178459][T14065] Call Trace: [ 1373.181779][T14065] dump_stack+0x172/0x1f0 [ 1373.186491][T14065] sysfs_warn_dup.cold+0x1c/0x31 [ 1373.191462][T14065] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 1373.197577][T14065] sysfs_create_link+0x65/0xc0 [ 1373.202444][T14065] device_add+0x75c/0x17a0 [ 1373.206880][T14065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.213147][T14065] ? uevent_show+0x370/0x370 [ 1373.217758][T14065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.224076][T14065] wiphy_register+0x1c46/0x2720 [ 1373.228952][T14065] ? wiphy_unregister+0x1040/0x1040 [ 1373.234299][T14065] ? __kmalloc+0x608/0x770 [ 1373.238732][T14065] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1373.244563][T14065] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1373.249879][T14065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 00:24:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507006000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1373.256465][T14065] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 1373.262198][T14065] ieee80211_register_hw+0x157e/0x3ac0 [ 1373.267692][T14065] ? ieee80211_ifa_changed+0xde0/0xde0 [ 1373.273173][T14065] ? memset+0x32/0x40 [ 1373.277177][T14065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.283536][T14065] ? __hrtimer_init+0x13d/0x280 [ 1373.288498][T14065] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 1373.294420][T14065] ? hwsim_register_received_nl+0x420/0x420 [ 1373.300320][T14065] ? __sanitizer_cov_trace_switch+0x49/0x80 00:24:44 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10, 0x400) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:44 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', r0, ':chain\x00'}) [ 1373.300343][T14065] hwsim_new_radio_nl+0x9e3/0x1070 [ 1373.300363][T14065] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 1373.300379][T14065] ? nla_memcpy+0xb0/0xb0 [ 1373.300405][T14065] ? __nla_parse+0x43/0x60 [ 1373.326615][T14065] genl_family_rcv_msg+0x74b/0xf90 [ 1373.326641][T14065] ? genl_unregister_family+0x7b0/0x7b0 [ 1373.337323][T14065] ? __kasan_check_read+0x11/0x20 [ 1373.342367][T14065] ? __lock_acquire+0x16f2/0x4a00 [ 1373.347406][T14065] ? perf_trace_lock+0xeb/0x4c0 [ 1373.352288][T14065] genl_rcv_msg+0xca/0x170 [ 1373.357096][T14065] netlink_rcv_skb+0x177/0x450 [ 1373.361887][T14065] ? genl_family_rcv_msg+0xf90/0xf90 [ 1373.361908][T14065] ? netlink_ack+0xb50/0xb50 [ 1373.361926][T14065] ? __kasan_check_write+0x14/0x20 [ 1373.361943][T14065] ? netlink_deliver_tap+0x254/0xbf0 [ 1373.361963][T14065] genl_rcv+0x29/0x40 [ 1373.361976][T14065] netlink_unicast+0x531/0x710 [ 1373.361995][T14065] ? netlink_attachskb+0x7c0/0x7c0 [ 1373.362011][T14065] ? _copy_from_iter_full+0x25d/0x8c0 [ 1373.362031][T14065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1373.362048][T14065] ? __check_object_size+0x3d/0x437 [ 1373.362072][T14065] netlink_sendmsg+0x8a5/0xd60 [ 1373.382810][T14065] ? netlink_unicast+0x710/0x710 [ 1373.382832][T14065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1373.382850][T14065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1373.382869][T14065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.382886][T14065] ? security_socket_sendmsg+0x8d/0xc0 [ 1373.382898][T14065] ? netlink_unicast+0x710/0x710 [ 1373.382916][T14065] sock_sendmsg+0xd7/0x130 [ 1373.382935][T14065] ___sys_sendmsg+0x803/0x920 [ 1373.423382][T14065] ? copy_msghdr_from_user+0x440/0x440 [ 1373.423412][T14065] ? __kasan_check_read+0x11/0x20 [ 1373.423432][T14065] ? __fget+0x384/0x560 [ 1373.447762][T14065] ? ksys_dup3+0x3e0/0x3e0 [ 1373.447790][T14065] ? __fget_light+0x1a9/0x230 [ 1373.447806][T14065] ? __fdget+0x1b/0x20 [ 1373.447825][T14065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1373.447853][T14065] __sys_sendmsg+0x105/0x1d0 [ 1373.501182][T14065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1373.506245][T14065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1373.511723][T14065] ? do_syscall_64+0x26/0x760 [ 1373.516440][T14065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.523045][T14065] ? do_syscall_64+0x26/0x760 [ 1373.529415][T14065] __x64_sys_sendmsg+0x78/0xb0 [ 1373.534205][T14065] do_syscall_64+0xfa/0x760 [ 1373.538736][T14065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.544673][T14065] RIP: 0033:0x4598e9 [ 1373.548676][T14065] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1373.568984][T14065] RSP: 002b:00007f4e0dfaac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1373.577406][T14065] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 1373.585491][T14065] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000009 [ 1373.593476][T14065] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1373.601473][T14065] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4e0dfab6d4 [ 1373.609457][T14065] R13: 00000000004c77c2 R14: 00000000004dd050 R15: 00000000ffffffff 00:24:45 executing program 2: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r1) io_setup(0xac, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) io_pgetevents(r2, 0x10000, 0x9, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000300)={&(0x7f0000000040)={0x8000}, 0x8}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) socket$can_bcm(0x1d, 0x2, 0x2) stat(&(0x7f0000000340)='./file0\x00', 0x0) getgid() getresgid(&(0x7f00000004c0), &(0x7f00000007c0), 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e0000002ac14140000001dba00000000"], 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000900)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000002c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000040)={0x0, 0xeee3, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x36cc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x24, 0x23, 0x829, 0x0, 0x0, {0x2804, 0xe00000000000000}, [@typed={0x10, 0x11, @str=':%/ime_type\x00'}]}, 0x24}, 0x1, 0x1c689, 0x0, 0x1cabe}, 0x0) socket(0x10, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="6aac6d", @ANYRES32=0x0], &(0x7f000095dffc)=0x2) 00:24:45 executing program 4: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) msgget$private(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x13}], 0x1, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r1, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r4 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r2, r3, r4}, 0xc) getpgid(0x0) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x80) connect(0xffffffffffffffff, &(0x7f0000000040)=@xdp={0x2c, 0x6, 0x0, 0x38}, 0x80) r7 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x400) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x80) connect(0xffffffffffffffff, &(0x7f0000000040)=@xdp={0x2c, 0x6, r8, 0x38}, 0x80) r9 = getgid() fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0, &(0x7f0000000200)=ANY=[@ANYBLOB='mode=00000000000000000000003,mode=00000000000020000000001,mod', @ANYRESDEC=r10, @ANYBLOB="6b31af", @ANYRESDEC=r11, @ANYBLOB=',smackfsdef=:']) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) setsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000001280)={r13, r11, r9}, 0x6f) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x4e20, 0x0, 0xa, 0x80, 0xc0, 0x2, r8, r11}, {0x1, 0x5, 0x4, 0x8, 0x8, 0x65, 0x1000, 0x7103aa21}, {0x3, 0x401, 0x3, 0x404}, 0x6, 0x6e6bbb, 0x2, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5}, 0xa, @in=@empty, 0x3502, 0x0, 0x4, 0x5, 0x9, 0xfb, 0x10001}}, 0xe8) r14 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r14, &(0x7f0000000040)=""/46, 0x2e) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x11, 0x6, 0x10000, 0x4, 0xf419f4638a404b09, r5, 0x2, [], r6, r14, 0x2}, 0x3c) getgid() 00:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507586500"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000400000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:45 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x15d) r0 = socket(0x10, 0x2, 0x0) r1 = mq_open(&(0x7f0000000100)='\\$.{posix_acl_access]@\x00', 0x2, 0x40, &(0x7f0000000140)={0x750c5cc2, 0x3, 0x8, 0x0, 0x8000, 0x2c4, 0x2, 0x7}) tkill(0xffffffffffffffff, 0x6) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000002c0)={0x3}) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4200, r2, 0xd10000000000000, 0x100002) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f00000001c0)={0x0, 0xfffffffeffffffff, 0x2024}) mq_getsetattr(r1, &(0x7f0000000180)={0x6, 0x50b, 0x6, 0x6, 0x400, 0x0, 0x5, 0xc2a}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$CAPI_CLR_FLAGS(r5, 0x80044325, &(0x7f0000000300)=0x1) ioctl$CAPI_NCCI_GETUNIT(r5, 0x80044327, &(0x7f0000000280)=0x5) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x404a80, 0x0) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000380)={0xfb}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) write(r1, &(0x7f0000000340)="e48900ea977f55c954a239d43ede00000000000646f90000000000000027990bc53a542fb500", 0x10000003d) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e24, 0x0, @local, 0x80000001}}, 0x0, 0x0, 0x0, "e111fd6b684fb55baf14d4d77d7c71f4c11f09906a5fd18b89485cd892c52fe29269619fb2b7ab3f7c7ff8143c9c084e999af4e84a2a352def67a55da1ffb9dda6a5cb41b7107c97ae3a95076377933b"}, 0xd8) 00:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507006800"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:45 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000040)) [ 1374.050585][T14119] sysfs: cannot create duplicate filename '/class/ieee80211/:%!ime_type' [ 1374.090672][T14119] CPU: 1 PID: 14119 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 1374.099838][T14119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.111118][T14119] Call Trace: [ 1374.114432][T14119] dump_stack+0x172/0x1f0 [ 1374.118797][T14119] sysfs_warn_dup.cold+0x1c/0x31 [ 1374.123760][T14119] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 1374.129849][T14119] sysfs_create_link+0x65/0xc0 [ 1374.134986][T14119] device_add+0x75c/0x17a0 [ 1374.139425][T14119] ? uevent_show+0x370/0x370 [ 1374.144020][T14119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.151335][T14119] wiphy_register+0x1c46/0x2720 [ 1374.151360][T14119] ? wiphy_unregister+0x1040/0x1040 [ 1374.151378][T14119] ? __kmalloc+0x608/0x770 [ 1374.151399][T14119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.151416][T14119] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 1374.151437][T14119] ieee80211_register_hw+0x157e/0x3ac0 [ 1374.151466][T14119] ? ieee80211_ifa_changed+0xde0/0xde0 [ 1374.151483][T14119] ? memset+0x32/0x40 [ 1374.151499][T14119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.151519][T14119] ? __hrtimer_init+0x13d/0x280 [ 1374.177816][T14119] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 1374.199894][T14119] ? hwsim_register_received_nl+0x420/0x420 [ 1374.199911][T14119] ? hwsim_new_radio_nl+0xa72/0x1070 [ 1374.199933][T14119] hwsim_new_radio_nl+0x9e3/0x1070 [ 1374.199954][T14119] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 1374.199971][T14119] ? nla_memcpy+0xb0/0xb0 [ 1374.199997][T14119] ? __nla_parse+0x43/0x60 [ 1374.200020][T14119] genl_family_rcv_msg+0x74b/0xf90 00:24:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x6, 0x4) socket$caif_stream(0x25, 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x20000) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={r2, 0x0, 0xfffffffff0000000, 0x4000}) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000100)={0xff, {0x72d, 0x46, 0x0, 0x4, 0x40, 0x8}}) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0x0) 00:24:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1374.200042][T14119] ? genl_unregister_family+0x7b0/0x7b0 [ 1374.252470][T14119] ? __kasan_check_read+0x11/0x20 [ 1374.257519][T14119] ? __lock_acquire+0x16f2/0x4a00 [ 1374.262557][T14119] ? perf_trace_lock+0xeb/0x4c0 [ 1374.267593][T14119] genl_rcv_msg+0xca/0x170 [ 1374.272033][T14119] netlink_rcv_skb+0x177/0x450 [ 1374.276819][T14119] ? genl_family_rcv_msg+0xf90/0xf90 [ 1374.282136][T14119] ? netlink_ack+0xb50/0xb50 [ 1374.286757][T14119] ? __kasan_check_write+0x14/0x20 [ 1374.291987][T14119] ? netlink_deliver_tap+0x254/0xbf0 [ 1374.297298][T14119] genl_rcv+0x29/0x40 [ 1374.301327][T14119] netlink_unicast+0x531/0x710 [ 1374.306381][T14119] ? netlink_attachskb+0x7c0/0x7c0 [ 1374.311508][T14119] ? _copy_from_iter_full+0x25d/0x8c0 [ 1374.316899][T14119] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1374.322641][T14119] ? __check_object_size+0x3d/0x437 [ 1374.327886][T14119] netlink_sendmsg+0x8a5/0xd60 [ 1374.332684][T14119] ? netlink_unicast+0x710/0x710 [ 1374.337748][T14119] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1374.343313][T14119] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1374.348794][T14119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.355048][T14119] ? security_socket_sendmsg+0x8d/0xc0 [ 1374.360614][T14119] ? netlink_unicast+0x710/0x710 [ 1374.365619][T14119] sock_sendmsg+0xd7/0x130 [ 1374.370048][T14119] ___sys_sendmsg+0x803/0x920 [ 1374.374737][T14119] ? copy_msghdr_from_user+0x440/0x440 [ 1374.380220][T14119] ? __kasan_check_read+0x11/0x20 [ 1374.385257][T14119] ? __fget+0x384/0x560 [ 1374.389609][T14119] ? ksys_dup3+0x3e0/0x3e0 [ 1374.394048][T14119] ? __fget_light+0x1a9/0x230 [ 1374.398743][T14119] ? __fdget+0x1b/0x20 00:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507006c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1374.402826][T14119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1374.409093][T14119] __sys_sendmsg+0x105/0x1d0 [ 1374.413692][T14119] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1374.418749][T14119] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1374.424217][T14119] ? do_syscall_64+0x26/0x760 [ 1374.428917][T14119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.434989][T14119] ? do_syscall_64+0x26/0x760 [ 1374.440036][T14119] __x64_sys_sendmsg+0x78/0xb0 [ 1374.444811][T14119] do_syscall_64+0xfa/0x760 00:24:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950001004b0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1374.449332][T14119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.455234][T14119] RIP: 0033:0x4598e9 [ 1374.459127][T14119] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1374.459135][T14119] RSP: 002b:00007f4e0dfcbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1374.459148][T14119] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 1374.459156][T14119] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000009 [ 1374.459164][T14119] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1374.459172][T14119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4e0dfcc6d4 [ 1374.459180][T14119] R13: 00000000004c77c2 R14: 00000000004dd050 R15: 00000000ffffffff [ 1374.532590][T14141] Unknown ioctl 4704 00:24:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xeafd, 0x101000) read$FUSE(r0, &(0x7f0000000240), 0x1000) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4c1a2d23999eb00ea368db25633657b52877baca0865a5b587ec8eaf0132a9dd256f453d6823a6593853de952b51f4462d98d016c3dac872a1ebaef04c2e848f2b4bc3e8e8bd50099d9de23f8e43bedb5cd90e6803288eeeac88026050f1c27e1bd1ccb0dd15033eb4bea7db1c71ba37da0c9b671245066d4649e94c5bf8f7368ddee9eab611b375ed50dc44c1270dc5babe64620dceb2c40711302f691e5e1d45edec273bffe7f8f66439a7f707257870218f6c7bef85d184106cad611829fd3233a", 0x10c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:24:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r1, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, r2}) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000004c0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507007400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x100000001, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2a0000002902000900eaff00030000000400000000000000bed20000000000000307002e2f66696c6530"], 0x2a) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r3 = openat$cgroup_subtree(r1, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000001c0)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@secondary='builtin_and_secondary_trusted\x00') 00:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507007600"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:46 executing program 4: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="810e15726ba469c73f9e1241e57a633a3b5aa505d525edd210b6e8244ac42e0bec3e1d0dc9d312cf1be91da581df979abdd5633e70acf1dcf8392547354aa5e629217d1ea1f1a1d88163b308", 0x4c, r0) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x1) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000004e0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:46 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=':\x00'}, 0x30) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x100000000004}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x8010000000000084) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0100b024", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={r4}, 0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000000)={r4, 0x2a, "9dd2782e7539c89f5be83fa69a184b9ac346b08f94002c21a4d1b33c364ee1cdb5def889ee0e5572f093"}, &(0x7f0000000040)=0x32) 00:24:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507007a00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1375.115101][T14178] encrypted_key: insufficient parameters specified [ 1375.154573][T14178] encrypted_key: insufficient parameters specified [ 1375.193529][T14178] encrypted_key: insufficient parameters specified [ 1375.242657][T14188] encrypted_key: insufficient parameters specified 00:24:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000500000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:46 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) 00:24:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = semget$private(0x0, 0x0, 0x4b0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000001040)=""/4096) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000240), 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x400041, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f00000000c0)='ro\x00', 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0xc6192a71005e85cc, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r5, r6, 0x0, 0x1}, 0xc3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507007c00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:46 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f00000024c0)='/proc/version\x00Z\xa2\xac\x00\x00\xb8\xb5\xa2\x8a)\xae\xcb\xf8C8ZQ%\x03\x98\xce\x12\xd9\x84\xf5*\x14\x9e\xaf\x98f\xf3\xc38(\xfes\xd4\xf3\x19R\x8b\xbd\x89\xfc\xef\xb6%\xad\xacF\xdfu\"\xeb\xb2<\x98\xadi\xbd\xc8%\t\xdfoCy\x17\x02\x00\x00\x00\xca\x02\x98\x89\x05\xb6r\xc3\xa2\r\x10\xf8\x90\xb9\xf5w$4\v8N\xcaa6\xea\xe4\xfdJ\x01^\a0v\xb8\xf1\xcd\xe4^\xea\x0f\x0f\f<\xa6N\xbd\xd0\xce\xfc\r\x9e\x8e\xa9\x1d\v\xbb\xa5\x00'/160, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) preadv(r0, &(0x7f0000000700), 0x1, 0x2) 00:24:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000600000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:47 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) flistxattr(r0, &(0x7f0000000000)=""/142, 0x8e) 00:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507008100"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000440)=@ccm_128={{0x303}, "efbf11be813da520", "b95f194936e2099526d559e1422e9d57", "39a23ef3", "d5b537c1e8d04811"}, 0x28) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) openat$cuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000240)={{0x9e, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x3, 'none\x00', 0x5, 0x8, 0x30}, {@rand_addr=0x2, 0x4e22, 0x2, 0xff, 0x6, 0x3}}, 0x44) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000003c0), &(0x7f0000000400)=0x8) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) sendto$isdn(r2, &(0x7f0000000180)={0xffff, 0x0, "2c79f7d21d73393a1943f485a8d4b99839ea6e8cc41feb3b893084522665eee01d10890badfaf40c52983572895795f7eca53d712e5ce0a98859c2fa81904a5ee33a6238e22c0cec0a98044c7b4c9dc00d76eedafac3fd4fcce82cbf1dab41a1eb57f501659a8d4d65397376504a21d0467931e7f68e99"}, 0x7f, 0x58084, &(0x7f0000000380)={0x22, 0xfec, 0x2, 0x5, 0x6}, 0x6) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x82000, 0x0) name_to_handle_at(r4, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000003000000b7e21a2d6f387b7993f998edbf8d2a4b8da9f18d121ef7e61fdc1063d3be30878e0a546792098093de149cd832b6dc0c2dd196120722c11f000000c173beac5b39f705298488540d716f6d0fda667e4cf0a2470fd49b53e38c28056bee871e40d0be2be819976928195fae4d674a70b14f1e0528231ab82755528ecca1"], &(0x7f0000000200), 0x400) r5 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000700000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507018400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:47 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) read(r0, &(0x7f00000005c0)=""/4096, 0x1000) 00:24:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:47 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/d\xa2\xb3u\xb5dm3\xdd\x8b\f#\x00', 0x3, 0x20003) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x1f, 0x8}, &(0x7f0000000200)=0x90) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x2c, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe, 'keyring&-eth1-'}}, 0x2c) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x6}, &(0x7f0000000280)=0x8) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x8001) 00:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050701a400"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) r2 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r2, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r2, r2, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r2, 0x0) fallocate(r2, 0x43, 0x8, 0x2) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x6) dup3(r1, r0, 0x0) 00:24:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffff800000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050701b000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:47 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)={0x3, 0x2, 0x7, 0x4, 0x3, 0x10000}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000850000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:47 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='blacklist\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005071aeb00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1376.655913][T14275] encrypted_key: insufficient parameters specified [ 1376.708371][T14275] encrypted_key: insufficient parameters specified 00:24:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) accept4$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x140000) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r2 = accept$netrom(r0, 0x0, &(0x7f0000000000)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400000, 0x0) io_submit(0x0, 0x2, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x10000, r2, &(0x7f0000000040)="ba7301890d2394506292b7a1eb0fff07dfc2baaee33182a418026ed6b57f34a541254b80ee832187daac1140ebdc56701bc29123ad30c84402d654aa4fc20902f9173919b78ef1e0dd2eed6285af3839a23de9c53522d3d0bae08d82ce4f2053f8e41c829f83ba71740e7fbcbc89d9531b8ff20e175bfdb9df4ab0e9c16117e1c8ffb3440766bf026c33f06f3cc39bda5852d5c9e3804dba042a52e89e5f910ed2a872744209ce370ba32b50f57aa53fdc44a1837d25e914b2a4bf7ddfbded70", 0xc0, 0x8, 0x0, 0x2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x4, r3, &(0x7f0000000180)="1b0896702aca08c3e468e898a710e5257da42cfb1c6c831f9418e762df92ddedf528cdb9803c74457c555df9b30aa290dfde26a4eee5fd40d9a1b0f3a5e27b2aab6df03e56cbe0b95c2482293132e7dfb336605482ad4e6357ca6b32232b1df840e873b2a83692e1c738da98aa763d27f1909301", 0x74, 0x2, 0x0, 0x3}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffff900000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700f000"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:48 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r2}, 0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x7f, 0x6}, &(0x7f0000000180)=0x8) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) sigaltstack(&(0x7f0000fff000/0x1000)=nil, 0x0) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$SIOCX25GCAUSEDIAG(r5, 0x89e6, &(0x7f00000000c0)={0x6, 0x6}) 00:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$set_reqkey_keyring(0xe, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x14, &(0x7f0000000080)="4da654c5ec726b0b37d27fcc564f7c7c93152b4c0c2f023ca62652d074a38bc7e286e4dc80a9242554a646870d71201375ca03b3cb6fbc7d7487a3ebae825798ed973c97c7978b99ef191790bc361c03e584a834ef0fa836a8a355a3bc8293eb7bfc7695a65ec0f62fb25a139f1b8c8a681926f5eee67287c5f072f69d7781480b8aaf2d04afb62a264458090a28e5200d07cae7cf8babb7ea5bbcd947156cafedbf5f0c35220082e5e5bb8167c42ee7899fa06bb1f60c75573d40953912216c8f17cc658f8d94d186391ad96639448b08113db038102767022e912e4782aeb8cae4616c20", 0xe5) 00:24:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095008000a00000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1377.023558][T14299] validate_nla: 50 callbacks suppressed [ 1377.023569][T14299] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1377.057020][T14299] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:48 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x2) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd0, r3, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7e894f5f}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd2f3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}]}]}, 0xd0}}, 0x40) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000002c0)={0x1, 0x0, 0x9d9cf89c697bfd1a, 0x3}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000300)={0x3, r5}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) r6 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$XDP_STATISTICS(r6, 0x11b, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x18) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x100, 0x0) sendto$x25(r7, &(0x7f0000000440)="61cfa83e463858c0e48f27", 0xb, 0x4840, &(0x7f0000000480)={0x9, @null=' \x00'}, 0x12) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f00000004c0)={{0x3, @addr=0xfaee}, 0x8, 0xfffffffffffffffb, 0x400}) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ubi_ctrl\x00', 0xa0080, 0x0) ioctl$TIOCGWINSZ(r8, 0x5413, &(0x7f0000000540)) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$sock_ax25_SIOCADDRT(r9, 0x890b, &(0x7f00000005c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x3800) write$cgroup_int(r10, &(0x7f0000000680)=0x41d, 0x12) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r11, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x4c, r3, 0xc59ee39c0ca792e0, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}]}, 0x4c}}, 0x80) r12 = syz_open_dev$dri(&(0x7f0000000800)='/dev/dri/card#\x00', 0x7ff, 0x8a82) r13 = openat$cgroup_subtree(r1, &(0x7f0000000840)='cgroup.subtree_control\x00', 0x2, 0x0) r14 = syz_open_dev$binder(&(0x7f0000000880)='/dev/binder#\x00', 0x0, 0x2) r15 = socket$can_bcm(0x1d, 0x2, 0x2) ppoll(&(0x7f00000008c0)=[{r12, 0x3c92}, {r13, 0x4000}, {r14, 0x46}, {r15, 0x2000}], 0x4, &(0x7f0000000900), &(0x7f0000000940)={0x7}, 0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000980)='/dev/sequencer\x00', 0x44000, 0x0) [ 1377.075883][T14299] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:48 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x4, 0x0, 0x8}}, 0x14) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) [ 1377.168998][T14299] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507fffe00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:48 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='se\xecB\xf1\x17@\xd3\xb9\atedselinuxem1!.userproc\x00'}, 0x10) 00:24:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:48 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x108, 0x0) clock_getres(0x2, 0x0) 00:24:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000001a00000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:48 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = socket(0x11, 0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) recvmmsg(r3, &(0x7f0000003c80)=[{{&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/79, 0x4f}, {&(0x7f00000000c0)=""/37, 0x25}, {&(0x7f0000000340)=""/60, 0x3c}, {&(0x7f0000000380)=""/168, 0xa8}, {&(0x7f0000000440)=""/131, 0x83}, {&(0x7f0000000500)=""/63, 0x3f}, {&(0x7f0000000540)=""/212, 0xd4}], 0x8}, 0x5}, {{&(0x7f0000000740)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/189, 0xbd}, {&(0x7f0000000880)=""/160, 0xa0}], 0x2}}, {{&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/211, 0xd3}, {&(0x7f0000000b00)=""/119, 0x77}, {&(0x7f0000000b80)=""/202, 0xca}, {&(0x7f0000000c80)=""/203, 0xcb}, {&(0x7f0000000d80)=""/10, 0xa}], 0x6, &(0x7f0000000e40)=""/14, 0xe}, 0x2}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000e80)=""/149, 0x95}], 0x1, &(0x7f0000002040)=""/176, 0xb0}}, {{&(0x7f0000000f80)=@xdp, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002100)=""/38, 0x26}, {&(0x7f0000002140)=""/166, 0xa6}, {&(0x7f0000002200)=""/83, 0x53}, {&(0x7f0000002280)=""/54, 0x36}, {&(0x7f00000022c0)=""/217, 0xd9}], 0x5, &(0x7f0000002440)=""/105, 0x69}, 0x2}, {{&(0x7f00000024c0)=@generic, 0x80, &(0x7f0000002600)=[{&(0x7f0000002540)=""/156, 0x9c}], 0x1, &(0x7f0000002640)=""/115, 0x73}, 0x9}, {{&(0x7f00000026c0)=@nfc, 0x80, &(0x7f0000002900)=[{&(0x7f0000002740)=""/180, 0xb4}, {&(0x7f0000002800)=""/167, 0xa7}, {&(0x7f00000028c0)=""/24, 0x18}], 0x3, &(0x7f0000002940)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000003940)=@in, 0x80, &(0x7f0000003c00)=[{&(0x7f00000039c0)=""/27, 0x1b}, {&(0x7f0000003a00)=""/41, 0x29}, {&(0x7f0000003a40)=""/2, 0x2}, {&(0x7f0000003a80)=""/86, 0x56}, {&(0x7f0000003b00)=""/200, 0xc8}], 0x5}, 0x5}], 0x8, 0x20, &(0x7f0000003e80)={0x77359400}) r5 = openat(0xffffffffffffff9c, &(0x7f0000003f00)='./file0\x00', 0x400800, 0x11c) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, &(0x7f0000003f40)=""/166) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000003ec0)={'vcan0\x00', r4}) [ 1377.560418][T14339] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffa00000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcf7dd4251a") mmap(&(0x7f00004d2000/0x4000)=nil, 0x4000, 0x2, 0x31, r0, 0x2) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0xadbe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442265238929350ade973718e3fc9534", "6bdda720", "7ef31430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0x3, 0x4000000, 0x0, 0x0) [ 1377.605176][T14339] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, r2, 0xf01, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x544011}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x0) 00:24:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1377.671690][T14339] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1377.764930][T14339] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070fff00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:49 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000140)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4\x94?\xb4uc3\xf7z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe94\xef\xbc\xce\x8d\xa6\xaea\xf7c\x88o[N\xf4Q\x84\xf3\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00=x\xe1\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/285}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x100, 0x0, {0x2, 0x2, 0x3f4a3e7c, 0x4}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') write$FUSE_POLL(r0, &(0x7f00000000c0)={0x18, 0x0, 0x8, {0x6}}, 0x18) 00:24:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffb00000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1377.929148][T14362] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1377.937279][T14362] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005077fff00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffb10000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:49 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80, 0x80000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = socket$inet6(0xa, 0x0, 0x8010000000000084) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={r4}, 0x14) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6612) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r7 = socket$inet6(0xa, 0x0, 0x8010000000000084) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000000)={r9}, 0x14) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r10, 0x6612) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r10, 0x84, 0x73, &(0x7f0000002640)={0x0, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r12 = socket$inet6(0xa, 0x0, 0x8010000000000084) r13 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f0000000000)={r14}, 0x14) sendmsg$inet_sctp(r6, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r9, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r11, @ANYBLOB="00000000000000008400000002000000060000800500000000000000", @ANYRES32=r14], 0xf8, 0x40000}, 0x4000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000002640)={r14, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r16 = socket$inet6(0xa, 0x0, 0x8010000000000084) r17 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r17, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r16, 0x84, 0x1, &(0x7f0000000000)={r18}, 0x14) sendmsg$inet_sctp(r1, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r4, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r15, @ANYBLOB="00000000000000008400000002000000060000800500000000000000", @ANYRES32=r18], 0xf8, 0x40000}, 0x4000) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r18}, 0x8) 00:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507feff00"/20, @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:50 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @empty}, 0xc) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2}}) syz_open_dev$mice(0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) signalfd4(r1, &(0x7f0000000000)={0x3}, 0x8, 0x89f20efa378b7b8d) 00:24:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffb20000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507004003000000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000340000000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_QUANTUM={0x8}]}}]}, 0x38}}, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x50c80) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)=0x2, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x80000, 0x0) bind$nfc_llcp(r5, &(0x7f0000000340)={0x27, 0x0, 0x2, 0x5, 0xffff, 0x1, "75b9181f5f8b80a23827288c9702e95b42af38ed7ccbbe90bed2c7aef220b1ffd7fcff5c79d77c48266c19f0f57661655e9a00527e5a61696a2a64ca27ddfc", 0x34}, 0x60) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:24:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffb40000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:50 executing program 2: r0 = socket(0x1e, 0x5, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='/usr/sbin/cupsd\x00', 0x10, 0x1) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$apparmor_current(r1, &(0x7f0000000180)=@profile={'changeprofile ', '-\x00'}, 0x10) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) faccessat(r1, &(0x7f0000000140)='./file0\x00', 0x88, 0x100) r2 = socket(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) sendmmsg(r0, &(0x7f0000000080), 0x1c0, 0x0) 00:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507fffff0000000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095fffeffb50000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000010000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:50 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r3, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r3, r3, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r3, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) pipe(0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x1ffffd, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r8 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r8, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r8, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000340)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000380)={0x3, 0x1, 0x8, 0x100000001}, &(0x7f00000003c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x41a5}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r6, r7, 0x0, 0x5, &(0x7f0000000200)='hash\x00', r9}, 0x30) 00:24:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffc00000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:51 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000140)={0xed, "7929cdcc65a8197850aaf32e99ccd87a0b6fa947e7c000d250ba659acbab35bb04bc6b5d08ab1bb48e81c41500c348c31efa45f04861ca93ca1287ef064f6c8b6e614c72c4461c1ad7dcfdd80ce341e11746637aab926642f3b9e7211bd1cafe2a425927cd605072f6df910b62e3060867ade504e1cfbdc512cd4abc8229ffbac5542e64f032b801cca7bf84880db1723db3e70fe0e24570c3165804b4ae017a02087fc7db3dbab5718973ae4f294f17b22a49fd2233f02d406a7c604240bc9664a6a5f3f0b9a73ac6a3d5f3b31d5e883e8c67f91b95f188bcf7a5644c4a59f863c7f08d534504774c02ac616a"}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000100)={r4, &(0x7f0000000040)=""/163}) 00:24:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507ffff30010000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000020000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffd00000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095ffffffe40000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000030000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:51 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x81, 0xa000) write$P9_RATTACH(r0, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x42, 0x2, 0x6}}, 0x14) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100)=0xffff, &(0x7f0000000140)=0x4) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000005c0)={0x0, 0x5, 0x7, 0x8001, 0x6, 0x3ff, 0x5, 0x0, 0x2, 0x7, 0x1}, 0xb) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f00000002c0)={{0x1, 0x3, 0x2400000000000000, 0x2, 0x7}, 0x80000001, 0x1000, 0x3}) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getresuid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000400)={0x3, @default, r4}) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) sendto$netrom(r5, &(0x7f0000000180)="d5e86592914bf961b9230ff2930f31bbda97a84bc404a661529f2cb4316d8cd6436b9fb8451f7b9c88baaddf470d006618427d125f069fbf4dcdb7d8f802dc6b90898afff485c7855624e14fbe1d7ca6d53c76617b1b9fdbeacded313016fc6e1ba2b1b530388870ac31e1ad9f6c467a25c7a4955236198ca8050fb360da13b98a01c7814d09d285ed2de882", 0x8c, 0x800, &(0x7f0000000240)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@default, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000001, 0x4010, r2, 0x10000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00', r0}, 0xfffffffffffffece) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @loopback}, {0x6, @remote}, 0x0, {0x2, 0x4e20, @loopback}, 'bcsf0\x00'}) 00:24:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000040000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000930ed0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x401, 0x0, 0x0, 0x31c0000000, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff816, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2, 0x0, 0xd}) r2 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x8, 0x2) recvfrom$rose(r2, &(0x7f0000000600)=""/169, 0xa9, 0x10, &(0x7f00000006c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x40) 00:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000050000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:52 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) fanotify_mark(r0, 0x20, 0x13, r0, &(0x7f00000001c0)='./file0\x00') syz_open_procfs(r1, &(0x7f0000000180)='loginuid\x00') write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$P9_RLERROR(r0, &(0x7f0000000040)={0x10a, 0x7, 0x2, {0x101, 'map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'}}, 0x10a) io_setup(0x4, &(0x7f0000000000)) 00:24:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000ff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000060000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:52 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x60000, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) [ 1380.889242][ T26] audit: type=1800 audit(1568593492.254:166): pid=14516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17370 res=0 00:24:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500009fff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000002060000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = socket$inet6(0xa, 0x0, 0x8010000000000084) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet6(0xa, 0x0, 0x8010000000000084) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000, 0x0) r8 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r11, 0x0) write$cgroup_pid(r9, &(0x7f0000000340), 0x12) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000000)={r12}, 0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r12, 0x6, 0x0, 0x8, 0x1}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r5}, 0x14) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r13, 0x6612) r14 = socket(0x10, 0x3, 0x0) write(r14, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) ioctl$sock_kcm_SIOCKCMCLONE(r14, 0x89e2, &(0x7f0000000200)) 00:24:52 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x8, {0x80000005}}, 0x18) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r2) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r3, 0x490, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="487c6149007f78b7196342f8d1ef9839"}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000000)={0x10001, "08d5e8388c89f2726f374c10fde8bd99b443c5e5024cc469f3ec27c9eca9eefb", 0x1, 0x1}) 00:24:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b5fffeff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000070000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:52 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfc7, 0xc33b54744cda5208) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000080000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000ffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x6, 0x6, 0x3, 0x800, 0x0, 0x162, 0x14c81b, 0x1, 0xffff, 0x1, 0x7, 0x57d, 0x0, 0x7, 0x10000, 0x8000, 0x80000000, 0xe1c7, 0x0, 0xb8, 0x230, 0x6, 0x4, 0x7, 0x8, 0x5, 0xffff, 0x0, 0x7fff, 0x8, 0x400, 0x100000001, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, @perf_config_ext={0x3ff, 0x3f}, 0xc009, 0x3, 0xe481, 0x9, 0x49, 0x6, 0x80000001}, 0x0, 0x6, r0, 0x1) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb9c00a480e1811000000ecbd6efb120009000e00210020000000002000bf0086", 0x2e}], 0x1}, 0x0) keyctl$setperm(0x5, 0x0, 0x8000000) 00:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507ffff30080000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:53 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x80000000}, &(0x7f0000000040)=0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400001, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) r1 = accept$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = socket$inet6(0xa, 0x0, 0x8010000000000084) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={r4}, 0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r4, 0x200002eb78dba, 0xf213361a71611141}, 0xfe12) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) 00:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r2, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) sendto$inet(r2, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) accept4(r3, 0x0, &(0x7f0000000140), 0x800) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r5 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xa2, 0x400) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r5}) getsockopt$inet_tcp_int(r1, 0x6, 0x15, 0x0, &(0x7f0000000040)=0xfffffffffffffe49) 00:24:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950080ffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000090000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000006115141c30970bfff0e082502d05000000fa0000000000f324614056be33c8a54fcea57b4055ccce572466629592e38d15d5ee62e8c8be012cb3443d7502cab7b52258ce13ac9e1a368c7142ff3a905b9efc8eeccca5fa6db0290b180d08de16d7b4f51976769fc1acfbe076800895b6b9bdfeffa94806e8f4914c1a6654b3ff6f5e7295aa1723ed3053fdcbe1e055fc240856195c753dd1b2342065e1eb11aa439015719dc6bb7cd6aa20bd950e200000000000000024ab95b1bcf70c49f9e96388dd897e30492273337cc49b0bdff19c0a143f82f167d37267240ee6845acbef10602813ca819f91c6ab496467183338c9c96c9110eff4ffca825bb584201671d4735cf71f65aee011b448c0462cc3e000"], &(0x7f0000f6bffb)='GPL\x00'}, 0x48) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x695, 0x20000) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x2, 0x9c, 0x9, 0x4, 0x8, 0x2, 0x9, 0x0, 0x3, 0x323, 0x7fffffff}, 0xb) 00:24:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009580ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1382.229094][T14617] validate_nla: 72 callbacks suppressed [ 1382.229105][T14617] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:53 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x2f2) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)=""/69, &(0x7f0000000080)=0x45) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) [ 1382.308304][T14617] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_tid_address(&(0x7f0000000040)) seccomp(0x20000000001, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x6, 0x0, 0x50000}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 1382.375046][T14617] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1382.398998][T14617] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000000a0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:53 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\"\xc3W?-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\xaf\x8b8\xcf\xe4\x0f\x8d\x84\xca\xafJ\x10\x15\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00\x00'}, 0x10) fcntl$addseals(r0, 0x409, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x215, 0x149a80) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000040)=0x1) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6, 0x0) 00:24:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009590ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1382.589483][T14637] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1382.648741][T14637] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:54 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x80, 0x121) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) r5 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) r6 = fcntl$getown(r5, 0x9) ptrace$pokeuser(0x6, r6, 0x7fe, 0x2) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x4) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f0000000fc0)="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") r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1}, 0x20) fcntl$setownex(r7, 0xf, &(0x7f0000000180)={0x2, r6}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x2, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x28}, 0x0, 0x1000000000, 0x1, 0x3, 0x3b9}, 0x20) connect$inet6(r8, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r9 = syz_open_procfs(r6, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r8, r9, &(0x7f00000000c0)=0x202, 0x8) r10 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10c800) r12 = open(&(0x7f0000000340)='./file0/file0\x00', 0x8040, 0x32) setsockopt$sock_linger(r12, 0x1, 0xd, &(0x7f0000000200)={0xfffffffffffffffe, 0xfffffffffffffffb}, 0xfffffffffffffed7) r13 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x1ff, 0x200201) setsockopt$inet6_int(r13, 0x29, 0xcf, &(0x7f0000000840)=0x1, 0x4) sendmsg$NBD_CMD_RECONFIGURE(r9, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="040027bd7000ffdbdf25030000000c00050002000000000000002400070008000100", @ANYRES32, @ANYBLOB, @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="0c00060002000000000000000c00020007000000000100000c0005002000000000000000"], 0xfffffffffffffe5f}, 0x1, 0x0, 0x0, 0x4000800}, 0x81) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r10, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0xd96d8c4122e68d74}, 0x40000) r14 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x101000, 0x0) r15 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) r16 = socket(0x10, 0x3, 0x0) write(r16, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r17 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r18 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r18, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r19 = socket(0x10, 0x3, 0x0) write(r19, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xac, r10, 0x401, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6b1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfffffffffffffff7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r14}, {0x8, 0x1, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}, {0x8, 0x1, r18}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r19}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x80}, 0xa0) 00:24:54 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0xcb5, 0x1, 0x1}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000014c0)={r1, &(0x7f0000001500)="1684"}, 0x10) [ 1382.709407][T14637] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1382.747770][T14637] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:54 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x96) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) tgkill(r2, r3, 0x8) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000000)) 00:24:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095a0ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507fffe400a0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup3(r0, r1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = shmget(0x3, 0x3000, 0x1, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_LOCK(r2, 0xb) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000100)={0xa3c, 0xb4df, 0x2}) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) 00:24:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1383.011050][T14666] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:54 executing program 3: r0 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x200000000, 0x180) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00', r0}, 0xfffffffffffffda6) [ 1383.058587][T14666] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:24:54 executing program 4: sysinfo(&(0x7f00000002c0)=""/222) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 00:24:54 executing program 2: r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="78a452635ff36ec857c75c0dc0"], &(0x7f00000000c0)='./bus\x00', &(0x7f0000000400)='ubifs\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x404000) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x6, 0x6, 0xfffffffffffffff8, 0xc0, 0x4, 0x100, 0x4d2, 0x7ff, 0x5], 0x9, 0x2, 0x80, 0xc2, 0x0, 0x1, {0x0, 0x5, 0x9, 0x5, 0x8, 0xffff, 0x7, 0x8, 0x0, 0x22, 0x3bc8, 0x6, 0x9, 0x7f, "a563c79579bc9fc489e2061e80633b29900c27c4349cda60004e6d2a53c0c8a1"}}) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x820080, 0x0) accept4(r0, &(0x7f0000000800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000880)=0x80, 0x80800) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000008c0)={r2, @local, @local}, 0xc) 00:24:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b0ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000000b0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1383.253937][T14682] encrypted_key: insufficient parameters specified 00:24:54 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x33, 0x37, 0x2, {0x3, 0x7fffffff, 0x2, r1, 0x15, '/dev/bus/usb/00#/00#\x00'}}, 0x33) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, r0}, 0xfffffcf7) [ 1383.309445][T14682] encrypted_key: insufficient parameters specified 00:24:54 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000180)='asymmetryc\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15kRQ\xfb\xb3>\xc8\x8e\x99XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc\x96\x9b?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe(\x8cS\xb9\xa4V\nc\xa8\x96^\x95\x86\x93\xf9j\x15\x1d\xcd\x0fV\xf1\x05\x80m\xd2\xfeqaw)', &(0x7f0000000140)=@chain={'key_or_keyring:', r2, ':chain\x00'}) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x3, 0x200400) getpeername$tipc(r3, &(0x7f0000000100)=@id, &(0x7f00000002c0)=0x10) [ 1383.394385][T14692] Invalid source name [ 1383.398440][T14692] UBIFS error (pid: 14692): cannot open "x¤Rc_ónÈWÇ\ À", error -22 00:24:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b1ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000000c0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1383.551812][T14692] Invalid source name [ 1383.571605][T14706] encrypted_key: insufficient parameters specified [ 1383.585899][T14692] UBIFS error (pid: 14692): cannot open "x¤Rc_ónÈWÇ\ À", error -22 00:24:55 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xfd\xfa\xcb\x803\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8\xfe\xec_\xfc\xb7\xc1\xe9y\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\x00\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe3L\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'}, 0x10) r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000140), &(0x7f00000001c0)=0x4) [ 1383.645123][T14708] encrypted_key: insufficient parameters specified 00:24:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000000c0)) dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl(r3, 0x8000, &(0x7f0000000140)="a32295ebfe2530ea8d793bc93f5d6bd9be8aaf50fb6cf125da77eb955f5bd59b17fae4dc6764465ae23511e6cd846b29e058e1696e3ec4892a33c237de5a013860df59e161c1e97e6e5310dd1c5f9085c536f49739bd7796edac4515a75a44ad2f31b41059804160628fb385305d9028b40244423e2e39c5e09d12466077dae33b652389dff474ff5a7514e1e57158e93ace9571d25c478eea7759a848646659237b9a510c66") getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) 00:24:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b2ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000000e0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x200) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x100000000}, 0x8) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x100000000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000100)=0x2) link(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) getpeername(r4, &(0x7f00000000c0)=@generic, &(0x7f0000000180)=0x80) r5 = open$dir(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='./file1\x00', 0x0) mkdirat(r5, &(0x7f0000000280)='./file1/file0\x00', 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000001700)='./file0\x00', r5, &(0x7f0000000000)='./file1/file0/file0\x00', 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) 00:24:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:55 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xc18400) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) fcntl$dupfd(0xffffffffffffffff, 0x230f4f4da2cf080b, r2) 00:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000000f0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095b4ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:55 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xc0200, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000040)={0x2, "ecd6"}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="c9e41deefe1ce81b20a3582c4cc13ec712a764677bfb27d108d45cb00e54e56c18249e49f4d0d84a54972c16beb695190b0d27f33e0d10fae6c46cd772582308027deced5bab32ae6adea8c5e527ced1489537caafe4824115addbb75e1f11db9b145dcef1", 0x65}, {&(0x7f0000000140)="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", 0xfb}, {&(0x7f0000000240)="84e902", 0x3}], 0x3, 0x0, 0x0, 0x440}, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000080)={0x9, 0x100000001, 0x7f}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000300)=""/154, 0x9a, 0x8010, &(0x7f00000003c0)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x1c) 00:24:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) ioctl$KVM_SET_CPUID(r2, 0x4188aea7, &(0x7f0000000080)={0x2, 0x0, [{0x40000019, 0x0, 0x0, 0x0, 0x3f}, {}]}) 00:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000100000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:55 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r3, 0x4) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0x1d) recvmsg$kcm(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000040)=""/114, 0x72}, {&(0x7f00000002c0)=""/26, 0x1a}, {&(0x7f0000000440)=""/179, 0xb3}], 0x4, &(0x7f0000000500)=""/179, 0xb3}, 0x2000) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f00000005c0)={0x6}, 0x1) r7 = accept(r3, 0x0, 0x0) write(r5, &(0x7f0000000100), 0x1ede5) sendmmsg$sock(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000100)='<', 0x1}], 0x1}}, {{&(0x7f0000001680)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000001700)="d1", 0x1}], 0x1}}], 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 00:24:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095c0ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80000, 0x0) 00:24:55 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000000)='md5sum/system(cgroupvboxnet1)vmnet1\x00'}, 0x15caff92b990b469) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8001, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000080)=0xffff) 00:24:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000110000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:56 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095d0ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:56 executing program 2: r0 = socket$inet(0x2, 0x2000080001, 0x4) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="f4", 0x2468d}], 0x1}, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x400) sendmmsg(r0, &(0x7f0000005c40)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @rand_addr=0x7fff}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)="db", 0x1}], 0x1}}, {{&(0x7f0000001380)=@pppoe={0x18, 0x0, {0x0, @empty, 'veth0_to_bridge\x00'}}, 0x80, &(0x7f0000002780)=[{&(0x7f0000001400)="8a", 0x1}], 0x1}}], 0x2, 0x0) 00:24:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000120000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000080)={r1, 0x0, 0x5, 0x9, 0x5}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="580000001400192340834b80020d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100050c1000418e00000004fcff", 0x58}], 0x1) 00:24:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095e4ffffff0000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:56 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) pread64(r0, &(0x7f0000000280)=""/58, 0x3a, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) bind$ax25(r2, &(0x7f0000000200)={{0x3, @default, 0x1}, [@bcast, @null, @bcast, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9cf6758f", @ANYRES16=r1, @ANYBLOB="42f325bd7000fddbdf250a0000000800060006000000480003001400060000000000000000000000ffff0000001f0800040001000000140006000000000000000000000000000000000014000600000000000000000000000000000000000800060002000000080005000000000008000500ac0000000800040007000000080005008b000000080004003bde00000800050002000000"], 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x80) 00:24:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000130000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:56 executing program 2: r0 = perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/18, &(0x7f0000000040)=0x12) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r3 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r3, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c90037300120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f56dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r3, r3, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r3, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f00000000c0)) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r4) 00:24:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006a26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:56 executing program 4: shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x800000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000fc}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = accept4(0xffffffffffffffff, &(0x7f0000000380)=@sco, &(0x7f0000000400)=0x80, 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f02000014001462726f6164636173746e6b02a2efff0000000000"], 0x30}}, 0x0) syz_mount_image$nfs4(&(0x7f0000000540)='nfs4\x00', &(0x7f0000000580)='./file1\x00', 0x8, 0x6, &(0x7f0000000800)=[{&(0x7f00000005c0)="f2f950b54323e8f5daa24bdd41f33410882bce582d67655b641b813ca72f1a37f09beab53556f32b7ceabb0ef916d5e1bdd018ab32b70e710caa5727a716a0cd0dd30eec892197bb7e4e7b2dee2b703b33912d7cb101e29f3ec27904ece9e0ca8013e9f088383b3af52d268835a409f1876883f8c4c1b3f77daf2f", 0x7b, 0x6}, {&(0x7f0000000640)="a5b8c65ba6eb5a0b9caeed70412dbc0dc2d88b5bf50a883a6777b5c83544958b0b", 0x21, 0x4}, {&(0x7f0000000680)="d6d98ef520547a03e325cb1ccd323d448f5d033913f821c2b36f1556729121bde26ec1cfa0c16ece4c73e1debc99a6c667a714ec64e1ef5853c3e7e4859ae7bb36b15e793558", 0x46, 0x7}, {&(0x7f0000001040)="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", 0x1000, 0x100000001}, {&(0x7f0000000700)="0b2430c19e01c70ec8460371a8fe24508681c99427536df7bb0005e8c8db0e0021caba0201d7d30ba422fdd8cbad27b0f2b35a686a5b596ef39c5c3486cbc695e854fc7ba07cd540212b61508501000989e917d0cc7c0cad327c291632a6c2cee7669f3cb7809777deda86d56113f51d609dd632f17030eba085d4037e47e40e00e351938b6ea2e15e9596663d08ab4f663b80b8d4def38eee0a", 0x9a, 0xe2}, {&(0x7f00000007c0)="86e25ddf3424cdd04b419429643d3dd373e46b5ac68989f5fd5ad599294061023bdf808b32aeaa", 0x27, 0xd194}], 0x10, &(0x7f00000008c0)='\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00042abd7000fbdbdf250100000000000064c500000000000cd912542d95e800000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r4, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000900), &(0x7f0000000940)=0x4) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x20000, 0x0) r8 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x8, 0x20000) lseek(r1, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r10 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r10, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r10, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r10, r10, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r10, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) r12 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r13 = socket$inet6(0xa, 0x0, 0x8010000000000084) r14 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r13, 0x84, 0x1, &(0x7f0000000000)={r15}, 0x14) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r16, 0x6612) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r16, 0x84, 0x73, &(0x7f0000002640)={0x0, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r18 = socket$inet6(0xa, 0x0, 0x8010000000000084) r19 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r19, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r18, 0x84, 0x1, &(0x7f0000000000)={r20}, 0x14) sendmsg$inet_sctp(r12, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r15, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r17, @ANYBLOB="00000000000000008400000002000000060000800500000000000000", @ANYRES32=r20], 0xf8, 0x40000}, 0x4000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r11, 0x84, 0x75, &(0x7f0000007880)={r15, 0x40}, &(0x7f00000078c0)=0x8) ioctl$SIOCX25SCALLUSERDATA(r8, 0x89e5, &(0x7f00000002c0)={0x37, "5b4e7087cde8058ffd4d339181cad725bb69e4e951f650e8c40189180f84bb3120260ceae6637e4f8c3e547cec784949ac831193f60f2692bdb3e6f444d560f9d129f758b1032d06a6bab2f4b98d4abcbdef6a42752ccd0d9dd2f76b23611694ee485e9f279da5b7714e701a419dc770067e81c646d000359c691f34c6085653"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f0000000140)={0x100000001, 0xc3, 0x5, 0x9, 0x2}, 0x14) lsetxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x4) shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffe000/0x1000)=nil) [ 1385.382283][T14825] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 00:24:56 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000140)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x5) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x2, @dev={[], 0x26}, 'veth0_to_bond\x00'}}) 00:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000140000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006b26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) bind$isdn_base(r0, &(0x7f0000000000)={0x22, 0x9, 0x1f, 0xffffffff, 0x9}, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000200000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$void(r0, 0x5450) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0xa80080) write$UHID_CREATE2(r1, &(0x7f0000000040)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x5a, 0x401, 0xe8, 0x8, 0xffff, 0x1f, "3f4eab457afa69d72fbf3d118d2e74a747cdd0e6a2be5c2b5877ff350f0d8d16eb2e452ab269ec27f14eb0193cd1c5858dc305a9c52bfa989899e4f4eeb834602b934cb151dc75b49b4e8db34de41d63f5c1d07e4aaa93eeb41b"}, 0x172) 00:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000001260000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006c26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:57 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000240)={'icmp6\x00'}, &(0x7f0000000280)=0x1e) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x9, 0x3, 0x2a8, 0xe0, 0xe0, 0xe0, 0xe0, 0xe0, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, &(0x7f0000000180), {[{{@ip={@local, @remote, 0xff000000, 0xffffff00, 'bpq0\x00', 'bridge_slave_0\x00', {0x7f}, {0xff}, 0x29, 0x2, 0x10}, 0x0, 0x98, 0xe0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x80000000, 0x7d6a5963, 0x2, 'snmp\x00', 0x6682}}}, {{@uncond, 0x0, 0xe8, 0x130, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101000) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x9dd) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000080)={0x9, 0x3, 0x0, 'queue1\x00', 0x4}) 00:24:57 executing program 2: r0 = perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/18, &(0x7f0000000040)=0x12) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r3 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r3, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c90037300120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f56dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r3, r3, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r3, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f00000000c0)) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r4) 00:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000003370000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:57 executing program 4: r0 = shmget(0x0, 0x1000, 0xc5a7939cef5172e9, &(0x7f0000ffa000/0x1000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x1000005001) shmctl$IPC_RMID(r0, 0x0) 00:24:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1386.485204][T14889] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 00:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000003f0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006d26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x20) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080)=0x5, 0x4) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x336) 00:24:58 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nfsfs\x00') recvfrom$inet6(r0, 0x0, 0x0, 0x1020, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r1, &(0x7f000000a8c0)=[{{&(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000008c40)=[@ip_retopts={{0x1c, 0x0, 0x8, {[@ra={0x94, 0x6}, @cipso={0x86, 0x6}]}}}], 0x20}}], 0x2, 0x0) 00:24:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000400000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006e26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:58 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) fgetxattr(r1, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000000c0)=""/168, 0xa8) write$capi20_data(r0, &(0x7f0000000040)={{0x10, 0x9, 0xff, 0x82, 0xfffffffffffffff8, 0x5}, 0x10, "7800c57b50f8a238f64e164f22740639"}, 0x22) 00:24:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:58 executing program 4: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b00000019008109e00f80ecdb4cb9260a6001800000d300e8010a", 0x1b}], 0x1, 0x0, 0x0, 0xa00}, 0x4040008) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x101000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000100)={'rose0\x00', @local}) 00:24:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3f, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x9, {0x1000000040007}}, 0x18) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x806}, 0x4) fsetxattr$security_capability(r0, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x5, 0x8}]}, 0xc, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000200)={0xc04e, 0x800, 0x6}, 0xc) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000240)={0x6, 0xae4d, 0x0, 0x31, 0xce14}) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) syz_open_dev$ndb(&(0x7f0000000380)='/dev/nbd#\x00', 0x0, 0xc000) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000280)) ioctl$TIOCSIG(r3, 0x40045436, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000000)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271, r0}, 0xfffffffffffffdee) write$binfmt_misc(r3, &(0x7f00000002c0)={'syz1', "6717159dd030204630c625e0d4ab316d6e040814551ebceb2b1b930a47eda2894e1a754325cbeaad5877e5e581e427c859aed09f7935a03899b45455b95e9a05883f2fb3a52f04d31ee4afef11ca05a5c1b7c02a3acee368247f49105179c211cae1cc40fd30995d5353e49c7f0f7e4c39d9d9085c49fe6f42f43259d69a010be1f2ddbc1884ff549f282e696a464c7ad6"}, 0x95) 00:24:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000002400000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006f26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:58 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'system!'}, {0x20, '*cpuset'}, {0x20, '\\-#posix_acl_accessvmnet1)systemppp0$vmnet0(.vboxnet0)selfvboxnet0'}, {0x20, 'security-wlan1%$/$vmnet0em1'}, {0x20, '&:'}, {}, {0x20, 'vmnet0}ppp1md5sumproc/wlan0'}], 0xa, "d7324e1d8908c0767aa0d9940d03f072cee8684262f1fe4f85a78d35c68ed5993c2993729abd7f40febbdc9fad5a31d262add21fa9f7a08434c1bc83cef9cbb46ecadaf9b4126249e0dc0f19b0b71f53df19781797abb7a42b2598b67458fccf79ad9ae81f18591da236fa33c6a69178d8403ecd1195e9e50785da8df18eaeddb4274d5e54891b"}, 0x121) mmap(&(0x7f0000f28000/0x3000)=nil, 0x3000, 0x1000000, 0x5e831, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TIOCSSOFTCAR(r2, 0x541b, &(0x7f0000000240)) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x22201) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r6 = socket$inet6(0xa, 0x0, 0x8010000000000084) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000000)={r8}, 0x14) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r9, 0x6612) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r9, 0x84, 0x73, &(0x7f0000002640)={0x0, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r11 = socket$inet6(0xa, 0x0, 0x8010000000000084) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r11, 0x84, 0x1, &(0x7f0000000000)={r13}, 0x14) sendmsg$inet_sctp(r5, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r8, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r10, @ANYBLOB="00000000000000008400000002000000060000800500000000000000", @ANYRES32=r13], 0xf8, 0x40000}, 0x4000) r14 = socket$inet6(0xa, 0x0, 0x8010000000000084) r15 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0xb27d5dbc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r14, 0x84, 0x1, &(0x7f0000000000)={r16}, 0x14) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000040)={r8, 0x10001, 0xff, 0x8, 0x80, 0x7, 0x0, 0x9, {r16, @in={{0x2, 0x4e24, @local}}, 0x401, 0x1, 0x2864, 0x2, 0x3}}, &(0x7f0000000340)=0xb0) listen(r6, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000380)={r17, 0x100}, 0x8) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000100)=""/199) [ 1387.394684][T14943] validate_nla: 54 callbacks suppressed [ 1387.394697][T14943] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1387.418368][T14943] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1387.426898][T14943] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:58 executing program 3: openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) [ 1387.444094][T14943] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007126000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:24:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004800)=[{{&(0x7f00000007c0)={0x2, 0x4e21, @local}, 0x10, 0x0}}, {{&(0x7f0000000ac0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000e00)=[@ip_retopts={{0xc}}, @ip_retopts={{0x10, 0x0, 0x7, {[@lsrr={0x83, 0x3}]}}}], 0x1c}}], 0x1, 0x0) 00:24:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000480000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1387.723979][T14977] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:24:59 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x50001, 0x0) 00:24:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007226000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1387.808899][T14977] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1387.824266][T14977] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:24:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:59 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @local}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r2, 0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r6}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={r4, r5, r6}, 0xc) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r7, 0x0, r7) r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r9, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r11}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000080)={r9, r10, r11}, 0xc) write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="640000007d010000004f000100b70e0000000200000001000000000000000000000500000000000000616d30000000000000850471dc5a57b652f1f4df7521000c006264655e215c430ee3fbed293ceffafecb83d3b900"/101, @ANYRES32=r5, @ANYRES32=r11, @ANYRES32], 0x64) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) [ 1387.916384][T14977] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:24:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0xfcc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000389200"/146], 0x90) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x2, 0x4) 00:24:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000003480000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:24:59 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:24:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007326000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1388.100403][T15001] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[15001] 00:24:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x6) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000001380)={0x0, 0x1c9c380}, 0x0) [ 1388.220326][T15001] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[15001] 00:24:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:24:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x100000006, 0x0, 0x0, 0x40007ffc0000}]}) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$P9_RREADDIR(r0, &(0x7f0000000140)={0xc5, 0x29, 0x2, {0x4b9, [{{0x120, 0x0, 0x4}, 0xcf0a, 0x0, 0x7, './file0'}, {{0x14, 0x3, 0x8}, 0x1, 0x0, 0x7, './file0'}, {{0x48}, 0x6, 0x1720, 0x7, './file0'}, {{0x20, 0x0, 0x5}, 0x4b, 0x1, 0x7, './file0'}, {{0x8, 0x1, 0x6}, 0x2, 0x2, 0x7, './file0'}, {{0x34, 0x4, 0x5}, 0x3, 0x1, 0x7, './file0'}]}}, 0xc5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 1388.549056][T15007] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1388.561814][T15007] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1388.577607][ T26] audit: type=1326 audit(1568593499.944:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x7ffc0000 00:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000004c0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007426000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1388.688988][ T26] audit: type=1326 audit(1568593499.984:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4598e9 code=0x7ffc0000 00:25:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1388.815763][ T26] audit: type=1326 audit(1568593499.984:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x7ffc0000 [ 1388.815789][ T26] audit: type=1326 audit(1568593499.984:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=2 compat=0 ip=0x4137d1 code=0x7ffc0000 [ 1389.018088][T14998] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[14998] [ 1389.060465][T15001] ptrace attach of "/root/syz-executor.4"[8959] was attempted by "/root/syz-executor.4"[15001] [ 1389.119425][ T26] audit: type=1326 audit(1568593499.984:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x7ffc0000 [ 1389.164582][ T26] audit: type=1326 audit(1568593499.984:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4598e9 code=0x7ffc0000 [ 1389.187937][ T26] audit: type=1326 audit(1568593499.984:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x7ffc0000 00:25:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x0, 0x0, 0x0, {}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f0000000140)={0x4, 0x9, 0x3, 0x0, 0x8, 0x800, 0x4, 0xf262, 0x1, 0x200, 0xfff, 0x12, 0x0, 0x2ac, 0x6, 0x2, 0x1, 0x80000000, 0x49f334a2}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x44d, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {0x0, 0xa}, {0xffff, 0xffff}}}, 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492587, 0x0) 00:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000540000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:00 executing program 4: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0100") r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r2, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1c) sendfile(r2, r2, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r2, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/182, 0xb6}, {&(0x7f00000001c0)=""/157, 0x9d}, {&(0x7f0000000300)=""/95, 0x5f}], 0x3) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1389.329086][ T26] audit: type=1326 audit(1568593499.984:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4598e9 code=0x7ffc0000 [ 1389.399733][ T26] audit: type=1326 audit(1568593499.984:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x7ffc0000 [ 1389.452139][ T26] audit: type=1326 audit(1568593499.984:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15026 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4598e9 code=0x7ffc0000 00:25:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007626000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000001560000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000600000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:01 executing program 2: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0xffffffffffffff65) getsockopt$inet6_int(r1, 0x29, 0xb3e20feda7cb93c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x1, [0x2]}, 0x6) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$FUSE_LSEEK(r3, &(0x7f0000000140)={0x18, 0xffffffffffffffda, 0x2, {0x7}}, 0x18) 00:25:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007726000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000058650000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x2, 0x0, &(0x7f00000000c0)) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) sendto$llc(r1, &(0x7f0000000000)="04d839c714cad5588b4f1b4c02668d17ec2191e530afd47af9a8918187541fa7d633e4578ea42d9e945d88566347320925b3d2995f5fccaa0a40713996a08e4b4c228e79f957cc9734d74ff3c47e79f4522929d46172f8aad523c96688d6d5bd4e5038cdab5a3ff874a6a052e4f45676fe77b13b29ba3b2cf68134cae3237b8224ff", 0x82, 0x20000000, &(0x7f0000000100)={0x1a, 0xff4f, 0x5, 0xffffffffffffffff, 0x4d5, 0x7}, 0x10) 00:25:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000680000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:01 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x100000006}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x50c1, 0x0) 00:25:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000006c0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:01 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x80c001) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00010009", @ANYRES16=r4, @ANYBLOB="000225bd7000fbdbdf250100000014000900fe80000000000000000000000000000e080002000a000000080003002900000004000500"], 0x3}, 0x1, 0x0, 0x0, 0x20010080}, 0x80) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000080)={0x0, 0x3f, 0x8000, {0xffff, 0xe0}, {0x2, 0x4ea7}, @period={0x5c, 0x80000001, 0x100000000, 0x9, 0x3a9, {0x1, 0x2, 0x80, 0x3}, 0x5, &(0x7f0000000280)=[0x2, 0x81, 0x6, 0x10cd, 0xffffffff]}}) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x313081, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={r5, &(0x7f0000000340)="13dd71b72b9e642e5e165b57e880253e899bd85681f63f34b7cd03913fd6fdad8fdff6291830fa00f7607030df25516a0a2d3fd49603c310e3333900d95b2c8dc2ba69bb9538b4134e37fbcb91fcacab635d33fce244711e3fd9a6b4803bf3210fc0eeb9dc9af5528bbdb93f42222db68d40c96cd657f69e6cdb0ff7ce0329930c1fe03d64221bb11c93d31e07bde670a7a7d1ea906dcfcf01fc78bfe25fe8cfc6b30349372a8039f0c9fe2e9cf2e387d9b87529225fc820e0eb522e982ca392a2947633b740bf08c125b685cd1144dce76880f5444dfcbb15fe5ff870293f86f22bb2abfdd155695fd7c3797bb98597c89c6c1f9ad4e5"}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="3e00000006000000000000000000000000000000000000000100000000000000150000000000000005000000000000002f7573622f3030232f3030230000"], 0x3e) socket$inet(0x2, 0x800, 0x8a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$void(r6, 0xc0045878) r7 = socket$inet(0x2, 0x1a55db456b8865a7, 0x400003) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r7, 0x84, 0x12, &(0x7f0000000000)=0x401, 0x4) r8 = socket(0x10, 0x3, 0x0) write(r8, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$IPT_SO_GET_REVISION_TARGET(r8, 0x0, 0x43, &(0x7f0000000480)={'NETMAP\x00'}, &(0x7f00000004c0)=0x1e) 00:25:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007a26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000740000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007b26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000760000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r5}, &(0x7f0000000080)=0x8) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r6 = dup2(r0, r2) dup3(r6, r1, 0x0) 00:25:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007c26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:02 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nul\x06\x00', 0x421500, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000140)={0x9, @raw_data="97c876315dc199ac100318a8027ef926fb6211cb99526fadb152b6f0726308940f4fd27f1a038ffcd7ac6ac106bcf8ca0c1504264784624ec853e945dee6fff1c94f932565c63ccd187d93d0b453dbc34a3f0b6e827b6925da4265c20844649f968182c405ddbb69746ffb420e74e88eba5243d8445d5912cdbaa1201cbccbe92e17107da81a8a6492f429905feff2da6e9c9c5845009fa03c290b1f6b093d8e2b70dbc1e389792f97a55e5de4081e6b5dcf5ce6bc26c7cc093e7434864eef437be4ffc14e52ee05"}) socket$kcm(0x10, 0x2, 0x10) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f00000000c0)={0x0, 0x1, @stop_pts=0x8}) semget$private(0x0, 0x4, 0x440) 00:25:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000007a0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007d26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000007c0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup(r0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x8b}]}) 00:25:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007e26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000810000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007f26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:03 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) bind$unix(r2, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000080)={'yam0\x00', @ifru_map={0x2, 0x0, 0x0, 0x100000000, 0x9, 0x2}}}) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0xfffffffffffffe49}], 0x100001a2) 00:25:03 executing program 4: syz_open_dev$binder(0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xa0) geteuid() getpeername$llc(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000240)=[0x7, 0x1]) dup(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f00000002c0)=""/33) write$sndseq(0xffffffffffffffff, &(0x7f0000000340), 0x0) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x8001}, @sack_perm, @window={0x3, 0x0, 0xec17}, @sack_perm, @sack_perm, @mss={0x2, 0x5}, @mss={0x2, 0x8000}, @mss={0x2, 0x6}, @mss={0x2, 0x2}, @sack_perm], 0xa) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000100)) 00:25:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000001840000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff8426000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) stat(0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) getegid() r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0xa) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x5, 0x0, @thr={&(0x7f0000000080)="b3fb35c10e8d61df461acaa3bb92c8ab4b23ecebf804c61316e2e858fc69", &(0x7f0000000200)="dbac970ad00b9d0587c354c81d9857b675dd99b69f5290787c007fb0bb926c8f59e57c304efa8c3ae14b793d0d7b57bcc32cd9d46fb86ecbcacf209a9cd51a630a096e191839b81e01ced59d069efd987ee8e98d9f64f4465c98946c74d6bfd6e15d68d32d6f258788e720edff3938d49b3bff95f663b65cc6850f1ae6e1d7f2fd1488093fd653595ee5c05e084e17b02cdbfef5df3d2893483a7558df93f1ee64cde14bb1d814648780bfb2e1a43b4f29b02c8e5a906ffd817f5b0f02e79afa2dc28f6c52f8149bd162cc1209e93ce9803f9fb7ac513de93a86fa3d7afc9897"}}, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@ipv4}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @dev}}}, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 00:25:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507ffffa8880000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff8526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1392.412626][T15214] validate_nla: 54 callbacks suppressed [ 1392.412640][T15214] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1392.428911][T15214] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1392.437128][T15214] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 00:25:03 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) fallocate(r1, 0x4, 0x7, 0x4) close(r0) [ 1392.519274][T15214] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:25:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff8726000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507ffffff9e0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1392.748153][T15230] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1392.770624][T15230] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1392.801451][T15230] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1392.810808][T15230] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:25:04 executing program 4: syz_open_dev$binder(0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xa0) geteuid() getpeername$llc(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000240)=[0x7, 0x1]) dup(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f00000002c0)=""/33) write$sndseq(0xffffffffffffffff, &(0x7f0000000340), 0x0) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x8001}, @sack_perm, @window={0x3, 0x0, 0xec17}, @sack_perm, @sack_perm, @mss={0x2, 0x5}, @mss={0x2, 0x8000}, @mss={0x2, 0x6}, @mss={0x2, 0x2}, @sack_perm], 0xa) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000100)) 00:25:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xac}, 0x10) r3 = dup2(r2, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000300)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f00000001c0)={{0x9, 0x5, 0x0, 0x15, 'syz0\x00', 0x57}, 0x3, 0x9afb0db30dd00325, 0x6, 0xffffffffffffffff, 0xa, 0x101, 'syz1\x00', &(0x7f0000000100)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '\x00', '\x00', 'vboxnet1#\x00', '/dev/snd/controlC#\x00', 'usereth1{selinuxGPLvboxnet0vmnet0-\x00'], 0xa1, [], [0x1, 0x7, 0xa105, 0x1]}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x800455d1, &(0x7f0000000040)) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x101000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r6, 0x400c55cb, &(0x7f0000000480)={0xa, 0x2, 0x6}) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r7, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r8 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r8, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$LOOP_CHANGE_FD(r8, 0x4c06, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x4, {0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, r9}}, 0x38) arch_prctl$ARCH_GET_CPUID(0x1011) 00:25:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000001a00000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff9426000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1393.081237][T15243] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1393.129199][T15243] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:25:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x2200000088) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x1004e20, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$rose(0xffffffffffffffff, 0x104, 0x3, &(0x7f00000000c0)=0x80, 0x4) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x2b, @loopback, 0x4e23, 0x0, 'dh\x00', 0x1, 0x2, 0x18}, 0x2c) r1 = getpgid(0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x2, 0x514, [0x0, 0x20000980, 0x20000abe, 0x20000aee], 0x0, &(0x7f00000001c0), &(0x7f0000000980)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x11, 0x12, 0x17, 'vxcan1\x00', 'ip6tnl0\x00', 'ifb0\x00', 'rose0\x00', @broadcast, [0x1fe, 0x101, 0x0, 0x0, 0x81b0533832be69f9, 0x1fe], @local, [0xff, 0x1fe, 0x1fe, 0x0, 0xff, 0xff], 0x6e, 0xbe, 0x10e, [], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6167c2dc, 'syz1\x00', 0x3d0d}}}], @common=@log={'log\x00', 0x28, {{0x3, "b5653f9546b0bf91be0d59d53a40ec264b31e79f3cdd1e8c04f61640f8fd", 0x1a}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{0x5, 0x8, 0x4305, 'rose0\x00', 'syz_tun\x00', 'bond_slave_1\x00', 'ip_vti0\x00', @local, [0xff, 0x17e, 0xff, 0xff, 0x7f, 0x7f], @remote, [0x0, 0x283c43d98b389c8d, 0xff, 0x0, 0x0, 0x80], 0x2a6, 0x326, 0x376, [@bpf0={'bpf\x00', 0x210, {{0x1f, [{0x80000000, 0x10001, 0x4, 0x3}, {0xe642, 0x6, 0x999, 0xffff}, {0x0, 0x80, 0x100, 0x5}, {0x9, 0x7, 0xec}, {0x3, 0x5, 0xfffffffffffffff9}, {0x7, 0x4, 0x0, 0x5}, {0x7, 0x43, 0x4, 0x9ddc}, {0x7ff, 0xfff, 0x1, 0x9}, {0xffffffffffffffff, 0xca, 0x0, 0x7}, {0xffffffffffffffe0, 0xfffffffffffff001, 0xed92, 0x3}, {0x0, 0x0, 0x6, 0x3}, {0x5, 0x200, 0x6, 0x7}, {0xd994, 0x100000000, 0x6, 0xfffffffffffffff7}, {0x322, 0x67, 0x715, 0x1b}, {0x200, 0x1, 0x6, 0x10001}, {0x9, 0x3f, 0x0, 0x7a}, {0x9, 0x2, 0x1f, 0x8}, {0xffffffffffffff37, 0x7, 0x2, 0x6}, {0x68da, 0x200020, 0x5, 0x6}, {0x20, 0x9, 0x4, 0x4}, {0x0, 0x69, 0xdf, 0x8}, {0xdc1d, 0x0, 0x2, 0xffff}, {0x7, 0xfffffffffffffe01, 0x3, 0x6}, {0x200, 0x2, 0x5, 0x400}, {0x1000, 0x5, 0x4, 0x3}, {0x5cdc, 0xffffffff, 0x8001, 0x8}, {0x7, 0x2cb963cc, 0x0, 0xff}, {0x8, 0x2000400000, 0x3}, {0x80000001, 0x0, 0x100000001, 0x3}, {0xb6e3, 0x8001, 0x1, 0x7}, {0x7ff, 0x7, 0x0, 0x9}, {0x2, 0x10000, 0xaea, 0x8}, {0x10001, 0x2, 0x2, 0x1f}, {0x6, 0x10001, 0x3, 0x6}, {0x5, 0x50e78bc, 0xffffffff, 0x883}, {0xa5d, 0xca, 0xffffffff, 0x2}, {0x0, 0x753f2b42, 0x2, 0x259}, {0x3, 0x7fffffff, 0x100000001, 0x8}, {0x7, 0x8, 0x7ff, 0x6}, {0x1f, 0x401, 0x0, 0x6}, {0x9, 0x20, 0x100000000, 0x80000001}, {0x8, 0x1, 0x0, 0x6}, {0x2, 0x20, 0x8000, 0x7}, {0xfffffffffffffff9, 0x3, 0x4, 0x10000}, {0x1, 0x3f, 0x1f, 0x2}, {0x135, 0x200, 0x100000001, 0x2}, {0x6, 0x81, 0x5f, 0x3e000}, {0x80000000, 0x3, 0xfff, 0x7}, {0x100000000, 0x4, 0x2, 0xffffffff}, {0xb444ba2, 0xdee, 0x3, 0x3f}, {0x7fffffff, 0x40, 0xf92ea3c, 0x8}, {0x0, 0x5, 0x40, 0x7}, {0x0, 0x8, 0x800, 0x8}, {0x3, 0x40, 0x1, 0x1000}, {0x7ff, 0xffff, 0x4b82, 0x10001}, {0x8, 0x0, 0x9, 0x4}, {0x9, 0x6, 0x86, 0x5}, {0x6, 0x4, 0x1, 0x9}, {0x3, 0xfffffffffffffffa, 0x1f, 0xa1}, {0x8001, 0x5, 0x401}, {0x400, 0x4c48, 0xc8, 0xfffffffffffffffb}, {0x4000, 0x1, 0x401, 0x7}, {0xa3, 0x100000001, 0xc9b, 0x6e}, {0x7a7, 0x1, 0x7ff, 0xffff}], 0x7fffffff}}}], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz0\x00', 0x7fffffff}}}], @common=@log={'log\x00', 0x28, {{0xfffffffffffff001, "2f36336d50086149cbde7be96fcaa44c97502b1be0b34285057897a7fadf", 0xe32cf5ae608d809f}}}}]}]}, 0x58c) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000100)={0x0, @reserved}) ioprio_set$pid(0x3, r1, 0x7) 00:25:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff9526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000001a40000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1393.364518][T15260] IPVS: set_ctl: invalid protocol: 43 127.0.0.1:20003 00:25:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff9726000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1393.443516][T15260] IPVS: set_ctl: invalid protocol: 43 127.0.0.1:20003 00:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000001b00000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:04 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x38) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x38) 00:25:05 executing program 4: syz_open_dev$binder(0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0xa0) geteuid() getpeername$llc(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000240)=[0x7, 0x1]) dup(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f00000002c0)=""/33) write$sndseq(0xffffffffffffffff, &(0x7f0000000340), 0x0) r5 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r5, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x8001}, @sack_perm, @window={0x3, 0x0, 0xec17}, @sack_perm, @sack_perm, @mss={0x2, 0x5}, @mss={0x2, 0x8000}, @mss={0x2, 0x6}, @mss={0x2, 0x2}, @sack_perm], 0xa) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000100)) 00:25:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff9c26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507fffe14e60000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffff9f26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700001aeb0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507fffffff00000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffa426000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070000fffe0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffa526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={&(0x7f0000000100)={0x210, 0x0, 0x0, 0x0, 0x0, {}, [{{0xfffffedd}, {0x191, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x0, 0x1, 'lb_hash_stats\x00'}, {}, {0x0, 0x4, 0xffffffffffffff81}}}}, {0x40, 0x1, @lb_port_stats={{{0xffffffe4, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{}, {0x12c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x32, 0x1, @bpf_hash_func={{0x0, 0x1, 'bpf_hash_func\x00'}, {}, {0x0, 0x4, [{0x9, 0xbeca, 0x5, 0x7fffffff}, {0x1, 0x5, 0x80}, {0x1000, 0x5, 0x8, 0x5}, {0xfffffffffffffff7, 0x2, 0x5d, 0x3ff}]}}}, {0x3c, 0x1, @notify_peers_count={{0x0, 0x1, 'notify_peers_count\x00'}, {}, {0x0, 0x4, 0xffffffff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0xfffffffffffffd97}, 0x1, 0x0, 0x0, 0x4}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) 00:25:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffa626000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700000fff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700007fff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffa726000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507e614feff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffac26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:07 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x10b081) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x20, r2, 0x1, 0x0, 0x25dfdbfe, {0x3, 0x6c00000000000000}, [{{0xfffffffffffffe75, 0x1, r3}, {0x4}}]}, 0x20}}, 0x4c) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x15, &(0x7f0000000140)={@mcast1, 0x0}, &(0x7f0000000180)=0x14) r6 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r6, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r7, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r8 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r8, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) r10 = socket(0x10, 0x3, 0x0) write(r10, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) r12 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r12, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r13, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00', 0x0}) r16 = socket(0x10, 0x3, 0x0) write(r16, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000980)=0xe8) r18 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r18, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getpeername$packet(r18, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) r20 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r20, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r21, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000b40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000bc0)=0x14, 0x893dee20d05024b6) r24 = socket(0x10, 0x3, 0x0) write(r24, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getpeername$packet(r24, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) r26 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r26, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r27, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r28, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) recvmmsg(r28, &(0x7f0000002c00)=[{{&(0x7f0000002300)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002380)=""/33, 0x21}, {&(0x7f00000023c0)=""/6, 0x6}, {&(0x7f0000002400)=""/77, 0x4d}, {&(0x7f0000002480)=""/247, 0xf7}, {&(0x7f0000002580)=""/65, 0x41}, {&(0x7f0000002600)=""/186, 0xba}], 0x6}, 0x5}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002740)=""/99, 0x63}, {&(0x7f00000027c0)=""/164, 0xa4}, {&(0x7f0000002880)=""/11, 0xb}, {&(0x7f00000028c0)=""/76, 0x4c}, {&(0x7f0000002940)=""/96, 0x60}, {&(0x7f00000029c0)=""/171, 0xab}], 0x6, &(0x7f0000002b00)=""/211, 0xd3}, 0x2}], 0x2, 0x40000000, &(0x7f0000002c80)={0x77359400}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8003000}, 0xc, &(0x7f0000003240)={&(0x7f0000002cc0)={0x544, r2, 0x1, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x40, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x4, 0x7, 0x6, 0x9}]}}}]}}, {{0x8, 0x1, r7}, {0x284, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0xfffffffffffffff9, 0xf5, 0x200, 0x1000}, {0x6, 0x2, 0x3, 0x8}, {0x80, 0x1, 0x1ff, 0x5}, {0x9, 0x5, 0x2, 0x4}, {0x4, 0x8000, 0x0, 0x20}, {0x2, 0xffffffffffffffff, 0x6, 0x401}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r15}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4e1d}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x108, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r21}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x5b3f, 0xfffffffffffffff8, 0xffffffff80000000, 0x47}, {0x1, 0x4, 0x7, 0x200}, {0x1, 0x9400000000000000, 0x9, 0xffff}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0xac, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r25}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r27}}}]}}, {{0x8, 0x1, r29}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}]}, 0x544}, 0x1, 0x0, 0x0, 0x40000}, 0xbaf1d930363f51) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x60}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 00:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070a40feff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffad26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:07 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x101002) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r3, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r3, r3, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r5 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r5, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r5, r5, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r7 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r7, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r7, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r7, r7, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r7, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000180)={0x64, 0xffff, 0x5, 0x0, 0x0, [{r4, 0x0, 0x70a}, {0xffffffffffffffff, 0x0, 0x8000}, {r5, 0x0, 0x4}, {r6, 0x0, 0x8000}, {r7, 0x0, 0x8}]}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x9, 0x20000) write$evdev(r1, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0x30) [ 1395.965415][T15361] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 00:25:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffae26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070130ffff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffaf26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005070830ffff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffb426000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1396.742483][T15361] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 00:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050788a8ffff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:08 executing program 2: futex(&(0x7f0000000180)=0x4, 0xd, 0x4, 0x0, &(0x7f0000000000), 0x2) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0x9, 0x6, 0x0, "943d87d7006b3ab3a4263b470cc8dc8a35e227b181413c6bc0a507732a4949bd", 0x59c16b2553ae5f6d}) futex(&(0x7f000000cffc)=0x1, 0xc, 0x1, 0x0, &(0x7f0000000040), 0x2) 00:25:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffb526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:08 executing program 3: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f000000b000/0x3000)=nil, 0x3000, 0x1800007, r0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000000)={0xfff, 0x1, 0x4, 0x200, 0xffff}, 0xc) 00:25:08 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x60049, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x54000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0xc0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') r1 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000980)={{0xcc, 0x8001, 0x8, 0x2c9, 0x378, 0x4, 0x2c9}, "83c566fcda6e91b495b053402b5520f9b503bcac2bd9336b3757e47eba97279b9c83572b5bec5aa2bcae418bf658f838c36b572ec2af4db599065feef8dc753b3b73cee5a1ef26f55a82216f701260191203af5463c8414232824ce8a81128f57f79d934234bcbbe196bf457b7f064f8efe33e06e55fce1544a004b0eaba59a9540898295873b85659bcd6c8982158d2cd5701c3962d9ff4a5426c7f30e0755417c635814af2d5f0a6a22a84b927de81d449be887476b8da363e44b39f5909081a490fa66eddb6d6f56d78c10e123144bc8a3f32a1af406b53cc706a06e6159b3a3be5cfc4816680d0eca7032e56dc6489247389b185e49430", [[], [], [], []]}, 0x519) r2 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r2, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0, 0xfffffffffffffdc4}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r3, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x6}, 0x10}, 0x70) r4 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r4, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000700)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bffff000000000000e790d2b763cba1fc5259c1da39e2a572e0fbcbf0477cacafca15e9160a030b9eef4543b03a476baeb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bdff07fc662d9b8045ebc4e36a0941ffea53935133dd99adb48634998be00000000000002a9192e9ac89c36b0000fda7b4ec908737a85473cf3554400000", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r5, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r6 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r6, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) accept4$packet(r6, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b80)=0x14, 0x80000) r7 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r7, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r8, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001bc0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001cc0)=0xe8) socket$kcm(0x2, 0x3, 0x2) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) accept$alg(r9, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 00:25:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)={'syz1', "11514afc931d2e946b6d8252af28de2df6ad36ade91bc1adeab03ac9b7a1297f3640c3166e98bdcce54aefc5eb05b80b0efdc16d1f0c224b7dea0f56b8f33b5c3337ac2f8abd00d7c294d850976c9daf53bed03905e6e852521606b057c24a989b53f18cc2b84376e6c1"}, 0x6e) close(r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x280, 0x0) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x2, {{0x104, 0x1, 0x6}, 0x3}}, 0x18) syz_open_dev$sndpcmp(&(0x7f0000001800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$RTC_WIE_ON(r3, 0x700f) io_setup(0xac, &(0x7f00000000c0)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) r5 = dup(r1) ioctl$KDDELIO(r5, 0x4b35, 0xffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x800000, 0x0) 00:25:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:08 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) 00:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700f0ffff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffb626000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005077fffffff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:08 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)=0x7ff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x7, 0x302800) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={0x0, 0x1000}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r3, 0xb7b, 0x9, 0xfffffffffffffffe, 0x7, 0x7f, 0x5, 0x5, {r4, @in6={{0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x13}, 0x2}}, 0x80, 0xed, 0x5, 0x4, 0x6}}, &(0x7f0000000400)=0xb0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x2, &(0x7f0000000280)=[{&(0x7f00000000c0)="7c8e05599af4a76c1b16ac020ac088c581e6c4ac8d98b6af958dfd6a1d27b9b737de835295ee568d0e4dee6c15b0b65b23ae7d16115053aa5d00d21c5ec6bc8d2293e564d4ec41e0f7838af773c873e5b45f3188524d4d926b1bf9a648a82bd7f8e9cfa3ea5c0df9ff40c043235b70986c4ab846e92ea61102f8eda35a82fb9bea96eff0a46be08f82fb4614aa8fdd4b706b125d42cf4e7cac90ca8b9d75fa39d49f61a39348fecc96989c69337f77e3", 0xb0, 0x11f6}, {&(0x7f0000000180)="51f426a7050a445583c7176a27e5fb41cb674995f4f57e5c40cca69cf2aeb1432702a79143820d14f4e2d5f832e34a0163c53b25bbaa245b63bdd93763603e01c8feae7733b8fabfbb86007481e5eb4d9fcafb5b13f18aacf1546a6ff3d9e7533b611e87e0a2676d7409410e90dace08b9168223f050fdbf6ec554110aeb3b6126849e4ee29b88175cd42b49984978e8ff92d97123fc3e8b3ac9c739f32cf6000afb23ca81234b2e82b5ad90c2080b43956a162e2a03fff4227c880f5a0a022f02b0b99dce885bc6e3f5f41b0f16c2f94df2dae915f46aed348d88d4112afe4962a61289ac7dcd2f5e", 0xe9, 0x4}], 0x2000000, &(0x7f00000002c0)={[{@usrquota='usrquota'}, {@notail='notail'}, {@expose_privroot='expose_privroot'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@noacl='noacl'}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}) 00:25:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffb726000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = socket$inet6(0xa, 0x0, 0x8010000000000084) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r5}, 0x14) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r6, 0x6612) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000002640)={0x0, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r8 = socket$inet6(0xa, 0x0, 0x8010000000000084) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000000)={r10}, 0x14) sendmsg$inet_sctp(r2, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r5, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r7, @ANYBLOB="0000000000000000840000000200000006000080050000000800000090ea5e311e4e1670b7a0a0f6d567495d1c4ad8fc53e65fb7d188ac76cb8f4aaea5db269e3e040a68e9fce1d8162a3935af2cf8d08d3c235a97a56f9697f166f14a9d", @ANYRES32=r10], 0xf8, 0x40000}, 0x4000) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r10, @in={{0x2, 0x4e24, @loopback}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0189436, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 00:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="78000000100005079effffff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1397.596900][T15455] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "func=FILE_CHECK" 00:25:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x110) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4784c}, 0x100) 00:25:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffbc26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1397.675401][T15465] validate_nla: 62 callbacks suppressed [ 1397.675413][T15465] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1397.759384][T15465] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1397.769525][T15465] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1397.777982][T15465] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:25:09 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000000c0)={0x7fffffff, 0xffffffff00000000, 0x8000, 0x0, 0x100000000, 0x2, 0x1, 0x750e923a, 0x9, 0x8000, 0x100000001, 0x7, 0x0, 0x9, 0x0, 0x5d5, 0xb5, 0x7, 0x7}) r1 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001ffc382ebd5e5bc53ab81262c0e6657c9145d1296714af248d32825ef82b6734e5a38b13b2a46b2896069e668e8af31c3e8132551000381668850a81eeb9a2f641de9e0242cef3fe27cf3d66e7e95c0ad3e1ef88e12f7a1d12d335f13fb31f86c7f35eba437b058cc620229d7839683afcd80a204fc04a0242b49ff12289013cbf84707dc9b19b1c7aa64501f2ec145d5db86598e85d7ee97c8cc1a2d7bc47c3bb8c96e466d3ba2aedf6639bc5228b0e1b3140c6c0f8cd6dceece8dc3ff9c7927d6b2bcdceb6b7fb4fccbc00"/236], 0x8) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="b1b6a9fc79f725cc0d3f", 0xa}, {&(0x7f0000000140)="d6be2d9ef42dd140f8aa7484288f901218f394a4081de5abf7c929ed8bc57ab1568218d9090266953f680809a6124b5d0e793f11afc74dd6e283010736b7a4657bf78259241b63f61536038299f2d9226481e8b3fa7de305eb1e3f4765b4d4825eb7a50e48bc5a0d8d8f870daa5b1e480eab216eead0b00b1c5ded759c87f07e727334a3c03274a69d7ecf4aa28108423d42853a3b46c3b2b352acc7f8740828d21a42e6bcb1cc993081bca50f0f9c3980d24beddce226ed7ef127e4cbe571f34fed5fed47d4796f01eedeffc9549bc0696616606c7d7dcce1902c07eda72aa90d29e0762096cbe5e6c2d938786e12129fb5c9754547", 0xf6}], 0x2}}], 0x1, 0x10) 00:25:09 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x401, 0x14cead66bc6d5cf2) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x282001, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r4, 0x8250aea6, &(0x7f00000002c0)=""/140) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x83w\xed\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/270}, 0x10) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '/dev/bus/usb/00#/00#\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x7) 00:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507f0ffffff0000000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffbd26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000180)={0x2, @win={{0x9, 0x1f, 0x0, 0x100}, 0xb, 0x8, &(0x7f00000000c0)={{0x8001, 0x3, 0x5, 0xffff}, &(0x7f0000000040)={{0x690, 0x1, 0x3, 0x1ff}}}, 0x1000, &(0x7f0000000100)="961d83882a9d23dd0b02bf825f8e4d7dd123dbbdc07ca442e4e5d5d476e30e507347543d97546d71b4e978a158949948bf4d3777bbe611f082e627570dfe3d899760c8ee9a6ed7ece4963a69ef5a16a990", 0x5}}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)=':\xd2\xa0\xf7\xee\xff\xff\xff\xee\xff\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1b, &(0x7f0000000080)='\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x9, 0x400, 0x7, 0x4, 0x0, 0x1f, 0x6b7, 0x168, 0x38, 0x1f, 0x0, 0x6, 0x20, 0x2, 0x7, 0xffffffff, 0xffffffff00000001}, [{0x1, 0x0, 0x1, 0x8, 0x1, 0x34d8945, 0x3, 0x1000}], "4780cb064f80bbea6814bebbaeb3eea74a98cd6bd5bc6200de537d7a4ac24b450d94cde2f3421371ac7f03e7fdecf753834ca8985e1966bb0c27f8d4bd7fb08d001413fe0be361011468890b97e42454f33432dca5108e74f931825326819ce6f0c7510f9359e8a82e3969f7f4d8cc0308b629894d9ca93e42c7e6d97a04ac5e362e7f1e3407f75b73616bae1269e70b5570d152a425fe76151257f9", [[], [], []]}, 0x3f4) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000680)={0xbb07, 0x5, "23c25d3c2f6a7c166e3a981ea69160d01f2a89a32f2269b82d69c69eb70ac552", 0x6, 0x7, 0x2, 0x1, 0x159}) [ 1398.194826][T15502] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:25:09 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r3, 0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={r5, r6, r7}, 0xc) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@local, 0x4e23, 0x0, 0x4e22, 0x3ca5, 0x2, 0x80, 0xc6a878c7d4fe5030, 0x0, r2, r6}, {0x9, 0x1, 0x6, 0x0, 0x0, 0x876, 0x80, 0x7e}, {0x0, 0x7, 0x7fffffff, 0x11}, 0x0, 0x6e6bb1}, {{@in=@empty, 0x4d4, 0x32}, 0x69865811e8e82c0d, @in=@local, 0x3507, 0x3, 0x1, 0x3f, 0x101, 0x100000001, 0x6}}, 0xe8) [ 1398.243154][T15502] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:25:09 executing program 2: r0 = socket(0x3, 0x100000, 0x3) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, {0xa, 0x4e23, 0x82, @dev={0xfe, 0x80, [], 0x28}}, 0x101, [0x100000000001, 0xa162, 0x2, 0xffff, 0xf52, 0x3, 0x1c, 0x3]}, 0x5c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000240)=ANY=[@ANYBLOB="0400000000000000843233000001000000eb81984228f7936041c43a0639d915233872b1b0f7602fb474b5d4f390be68220eb9422c5cb2004c27812a7ff33b32862f6fa03c8b9b6431fa36e9935c7e6bbbd0577a9c9d2db1b2fbf618cc5bf65d97c7fa3fd23bd55c69e6e0ddd1c3e8262427e7a02e5a6be80d6c6313789bed75a8a3139342b6a1941db03f74c2e1a66116fe64659a1e36fce317927c233119ff5318384bdb9f760e724ef4e24bfb7716946d5d923af29b1fa169ea7b3588fe1a9cc330746ae3984d25d7125df8c7f0dc9ddd603bfe8adbaba014b94d84da0e16d71083105bdd97"], 0x0) r1 = accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0xb, @dev, @default, 0x0, [@null, @default, @null, @null, @null]}, &(0x7f00000000c0)=0x40, 0x80000) bind$rose(r1, &(0x7f0000000100)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) 00:25:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1398.309415][T15502] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1398.346456][T15502] netlink: 'syz-executor.0': attribute type 23 has an invalid length. [ 1398.386651][T15512] ptrace attach of "/root/syz-executor.3"[31473] was attempted by "/root/syz-executor.3"[15512] 00:25:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffbe26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507ffffffffa001000000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:09 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{}, "9645e89650196a1a", "45b6e022dbf1fb07ff029bb594c2dcd09a59ebdbe2da06595dfd2797fa4d91bc", "b2d2c111", "b2134e61152bd8a8"}, 0x38) sendto$inet6(r1, &(0x7f0000000180)="8e", 0x1, 0x8000, 0x0, 0x0) sendto$llc(r1, &(0x7f00000000c0)='*', 0x1, 0x8000, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xa006, 0x0) dup2(r2, r3) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) timerfd_settime(r3, 0x0, &(0x7f0000000480)={{r4, r5+30000000}, {0x77359400}}, &(0x7f00000004c0)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "9645e89650196a1a", "45b6e022d3ffff2797fc5c00", "9660c111", "0011000000000100"}, 0x38) sendto$inet6(r6, &(0x7f0000000180)="8e", 0x1, 0x8000, 0x0, 0x0) sendto$llc(r6, &(0x7f00000000c0)='*', 0x1, 0x8000, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@empty}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x5, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0xfffffffffffffffd, 0x580, 0x10000}) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000280)) socket$inet(0x2, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r8 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r8, 0xc06864a2, &(0x7f0000000000)={0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f00000003c0)={0x4195221f, 0x0, 0x2, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000400)={r9, 0x37}) sendto$inet(0xffffffffffffffff, 0x0, 0x5, 0x10, &(0x7f0000000500)={0x2, 0x4e20, @local}, 0x10) 00:25:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) getpeername$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 00:25:09 executing program 4: seccomp(0x1, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000180)=0x119fb30ae6526aca, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYRES64], 0xfffffea6) r2 = socket$alg(0x26, 0x5, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = accept(r2, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x9c01, 0x10000, "abc0fcef92c3ac2bc9a287936f27f97924569fab1bc10deaed6fb5d64e2ded72e430e996028f83fbf03bc2fa2befd382800da38e2262f2fc3f6d7405f82083", 0x1}, 0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000000e, 0x0) setpgid(0x0, 0x0) 00:25:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1398.570111][T15528] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1398.598478][T15528] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:25:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffbf26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000003400000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:10 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) delete_module(&(0x7f0000000000)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00', 0x1000) 00:25:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_OUTPUT(0xffffffffffffffff, 0x8004562e, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="8d", 0x1}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r3 = dup3(r0, r1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:25:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffc326000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507fffffffffffff00000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffc426000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:10 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = getpid() r3 = fcntl$getown(r0, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r5, 0x0, r5) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) r7 = getpid() ptrace$getenv(0x4201, r7, 0x0, &(0x7f00000000c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r10, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KDSKBLED(r10, 0x4b65, 0x7ff) r11 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r11}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={r8, r9, r11}, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48000800}, 0xc, &(0x7f0000000040)={&(0x7f00000005c0)={0x604, 0x11, 0x92a, 0x70bd2b, 0x25dfdbfb, {0x1b}, [@nested={0x110, 0x41, [@generic, @generic="2da5a63b94fa2a3b9b0e5a57196b40aa499af5025b073fb288c82922c88343faba275dbf1e2acdb844a3b36c306544ae10d7130e80dd", @generic="7314aec3479bfec88df1653a60644940c96189e67b4b038b9422e1a27404895c85293a8bb44fc2e5dac5983cdf2b382804ac9a4b510d5d440a90e2b419c6bb75dc1a98d53208ac94fa5d39dc6552fc35e24931dfd01d9cb70bc99ecfbc59d3db546e5463a9b4b9a3b1a345c75f99fa7c69ef6b720283fa5c5612b2bfe65b0d5377770052beb8efc96def7995b4c38fe8fd5f5ce29dc9738b1da66acc3684ae7cdc58aaef2d8fe18a8693c469a66c98d052bb92af96d60880336c4f4e910586f5cccaf9b0b18cdffa6a6f497753a5621a455254c31f"]}, @typed={0x8, 0x17, @pid=r2}, @typed={0x8, 0x19, @pid=r3}, @generic="1f2d2b6ee2c1da41dc3d64e8f15b53231f25aa12ea7d0e6c85839515d3552487d37ee6911d120c39fedb8b94904fe5e145a716a4239fd2f80dcd15e3160391ea99d5a8b076afceea11da79e332b3d11c842974265c8248d0629e81f1ce9762660111c6393219d511860b558237d574f9828140b38b126ec1f6b438c17c534a531ce5ba9e52ff5bd15228b27794770dc669f8e5a8b1b79cf41c4ecc2637083a", @generic="76a371715d1c139938133c90fdec2d335342fa7b0835bbba2d4bf3332c5df6e9e35bcb550d5b43c67c3f13eba93802a6ab0d371c75f6fd2641dbc696048897636599d93bca1b3f69ffdf8d136b6a577d4290c7febe28712bbf95acdfcb2641640ea8c5cefb5550c135b99b7d3850f23bfbb7def7100be9fb80614fd228768265034fe52d0f01b38c494c4c01fbcbc2687811ccb92066901747cc3fdaeadbe3a0ae5657ac68fb1bd65158ddd12beeaab8007669ba5382564240bd92438be42a05074d7532f55d7f26e51def9724", @nested={0x350, 0x8b, [@generic="87a086c26a96da25f5453de79797fb82688884622e0fec59c5e6d77b03086b9d79c0d4d9819ea81e12ac632693b78cf280d5d2cc0297353132c89fa654a74df26956aff39cc68bfcf0ad16d5d077891e64e10496e4d0a2be497d5647bffdc7b6c9ff3a6f41bbebc18c071b8a93", @generic="e4facb9004f3012d172929c23829782207c852183012d523b4c63e44da16d360594e7637665eeaaa0b7b419520b6e7ff580cc21cb0a59f41cd013ed3c3da049aac0c404a3d98c0f9b9a8b200726155", @generic="71f15590862d2111f8839693affb5727581ac7b0c065863d89a7712b028b47f55a75704a1bd526e33843fb2fc0bb2b3119e566aa0ad518f2ca839e7be0143bb973141ef8d2b2ce903d8face111260118f06ca4af3df1ca19e410dfa56511657f8c154dc8e5940a3b95a66515e2e580ac74a5f505c71d446f2eacf6f6550ee44f6c353204a9fb6a64e274b7dab3a275a02c24ec1f48cbb07bbf8597c72bc1e0e1354fea01b55d5d9c7cb2181125792e5e774836abb4d06a3dbeb87eaf3ac3751c02058c59c177d1889a87de4cc3b136435950045e452866ae42477995d100ac4d81a3945d48ce06d6d04ff1647d643f", @typed={0xd0, 0x42, @binary="c101457573a344d2d5fb269393e47c1cb2cb55553903dd5cac0dc8bee90fb6ac07be6e91040723400815ce0e4b0b84fcc2ed3845e37293c66286178d04da494fe52a401c7a04415ce9100d24fd1fda8552082a6087ba6ee0e1614bc39a495ef63df958f241f2db478850ec4821c54c0bfb7bb76a4250b703f880e60b73f5e828bc5722a313f0ff8a1f0bce6bbaa12309761c3b2cd3e69189ff401b25edd7c5ab51473a43fb6396bbc7453e10ee62571c9249944a6444635ed65a7b43341780ba84af9e390237f8e6dfc9"}, @typed={0x4, 0x5}, @generic="c18af340702fee2e2c3e2c07e536f5168f5a36d57c8413bf02b435e2b1e46673371b914b5c1d8f4cb81a476479db3a273f74d7526a8fb09fc110e6404004a838d403124fbc551da694d5d21ea85134ef31d0c18ffd2deacd7f6818bd083b6d822bb2204950e12c3ae4c1454407ff233866a45318ccd89e24537fd74c5dc441d91ce3c9b5d6fe923bdbc8b419d27910ff660f835cbb1ee0f1a53950804a", @typed={0x8, 0x6, @fd=r4}, @generic="156a3b5c57a598d67dfb3ff93d25cfa0b8455454635534bb0f0ef8b54448cf54bcab141a4bad24"]}, @typed={0x8, 0x2a, @uid=r9}, @typed={0xc, 0x79, @u64=0xfff}]}, 0x604}, 0x1, 0x0, 0x0, 0x40000}, 0x1) 00:25:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") utime(0x0, &(0x7f00000001c0)) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000000)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}) 00:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000100000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1399.439351][T15581] ptrace attach of "/root/syz-executor.3"[31473] was attempted by "/root/syz-executor.3"[15581] [ 1399.553036][T15589] ptrace attach of "/root/syz-executor.3"[31473] was attempted by "/root/syz-executor.3"[15589] 00:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700000000ffff300100000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffc526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:11 executing program 4: pipe2(&(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x800000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) set_mempolicy(0x3, &(0x7f0000000200)=0x3, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x2}) 00:25:11 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x2, 0xffffffffffffffff}) syncfs(r2) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0xfffffffffffffffd) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x463a) 00:25:11 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) shmget$private(0x0, 0x2000, 0x4, &(0x7f0000ffb000/0x2000)=nil) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="56381317af445dd45017fbb71d94c59d61cec5c14ad1134beb9f9bf15b24b00719ce24cffcb7dc0dfdf8d99bf578a80fa635937d632a296a48102cea5183fc994ac6cf9551544ab50ef5fab3b4374c646467d1f39c2a1fa969fa513018b104e6b80c0b7576b4c82d319a1c3a23a479cfcf6bd6d73af7ae23e86f1b74ca52c303ef1c0e60437875942f302daec5f16dbf2120733b49a6d257c5028781126f9dd749d4671fb4c5a61efbecf61324f59c440eee19ef090c64", 0xb7) 00:25:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:11 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) syz_open_dev$midi(0x0, 0xb, 0x0) socket$inet6(0xa, 0x0, 0x8010000000000084) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xfffffffffffffffc, {0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80000001, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x210000, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000100)={0x17, 0x1, 0x1}) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000000)={{0xc818, 0x1000000000000000}, 'port1\x00', 0x97, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a2ac93edb2b5913}) fcntl$getown(r2, 0x9) mq_unlink(&(0x7f0000000180)='em1ppp1\x00') 00:25:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffc626000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000200000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) write(r1, &(0x7f0000000000)="d5", 0xfffffdc9) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80002, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x40, 0x2, 0x4}}, 0x14) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r3, r1) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1) 00:25:11 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006001a8004ff", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000100)='syz_tun\x00') ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f00000000c0)={0x8, 0xa1, &(0x7f0000000080)="92f95aa83fe30e81e2a0dd3cbf", {0x0, 0x4, 0x3032344d, 0x0, 0x4, 0x200, 0xa, 0xe81}}) 00:25:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000300000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffc726000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x1000004d031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)=0x0) sched_setparam(r3, &(0x7f0000000040)=0xfffffffffffffffc) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) write$UHID_INPUT2(r1, &(0x7f00000000c0)={0xc, 0xa, "8af852131737db8a7aa7"}, 0x10) 00:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000400000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:11 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) accept$packet(r0, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r2, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r3 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r3, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r3, &(0x7f00000000c0)="dd", 0x243, 0x800, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000380)=[{{0x0, 0xfef3, 0x0, 0x0, 0x0, 0xfffffffffffffdcc}}], 0x400000000000490, 0x6, 0x0) r4 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4) write(r4, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r4, r4, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r4, 0x0) r5 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) dup2(r4, r5) 00:25:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_FPEXC(0xc, 0x80002) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x32000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000300)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x5441700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, @mcast2, @loopback, 0x0, 0x3, 0x0, 0x0, 0x3fb}) wait4(0x0, &(0x7f00000001c0), 0x40000000, &(0x7f0000000240)) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f00000000c0)='./file0\x00') mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', r2, &(0x7f0000000180)='./file0/file0\x00') renameat2(r2, &(0x7f0000000100)='./file0/file0\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) 00:25:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffcc26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:11 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d0104cfe47bf070") poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x7) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) write$apparmor_current(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="6368616e676570726f0900000000000000b8c4c6ab999a1be400"], 0x1a) 00:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000500000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:12 executing program 2: r0 = socket(0x22, 0x2, 0x3) socket$pptp(0x18, 0x1, 0x2) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='dctcp\x00', 0x6) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x3dc, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="505784ac0ecc5c86280012000c00010076657468000000001800020014000100000025a0d43f3833abca1cfd11a61ffee25920ef41d36054cf756a80842ecf01355423d51b32c12e5b40b3f7bbbf058a8207a009c40b82e2c1f09fa86481a96fa19159a6e436e33649542b669340f3cc2db2fc5941f91449fbc09e4266fdaad43f1633e19210b7b33ea4cb2523d8374ffe0c5f7d322607b790529906288a6f7a78c7e69355daedd4a9dff6cd508f7912563c0cd1325ab846fe88d767d74e789ca7023fd66c614160d7e7dbe42992a1b35b006202cf01e21f392951", @ANYRES32=0x0, @ANYBLOB="e5fff2879000990c003e3acace4661aed39effffffffe754039eb65dc2b667e3f4354359cc36b2a1625d0cef8736988dcf7ddfaf711b9d0636f80233254030324609f8565af75b57a692abcfbc982ecd6d336e347064b872003da6719754aec636da081c9e2ad69e165023ac278ff9a632b6a89bb33774056b3275ecc12e2527c5cf7c05657734593d5768c40d47ce8a6ffdb6600dbc139b45357c03fc916b25c4f84e44c77f8857a7b2b58deb514fc09c36a7c2a6bba920a969459b"], 0x48}}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$nfc_llcp(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x27, 0x0, 0x2, 0x5, 0x1, 0x3, "d10c79c3e7c604aaac9b7a2ca4995553682d1c3f1546e92fd09e0d6bc9412659265302c96216b682bcde548fe0814535cb667cc4be23a5528f17c26d4d7f32", 0x21}, 0x60, &(0x7f0000000380)=[{&(0x7f00000001c0)="4a14062a222a19600c67377ac721b41fce2d7e18596f97e44e4f6e93efe802126ac4c0dd697b20d331c9a5d7fe6eeaf1c7ec297f4479213d8c2a58f702c50309fbfe5aa0233d761cf8950f82006ddf9f7f2977042c0c451e5160c0cfc871e1cdbcd6cc5a968a06df8c9b52fecfacc37b177fd2e7c9507d898e71e4cb35707896e73cb1ad130b9b116187cfd6c8f03ed19bc8b5c9689aa543fff05f524863854e16193909965ae2e416d458cd1fbbdf177c5c30b40e287cce51e927cfe794e167d7962e9d6464149eefb145f7f502ef57890aae7748", 0xd5}, {&(0x7f00000002c0)="9108ef8abd21610ecee8df0ec11c991318c919bd3fa27dc21c8d0c2a32567a671940be5cf3e83d0bf9207a78ff25e1f45e38842cbb3cd44bf80dadeb6d3f44024b90feab148b8535ea1ad909dc7bfe18bc2372ce9092f0f8ce89e3330a44e670843800277c759f689514594575dbafcf8cd1272fc0e95f11dd6926f8fa5870b0a185cbc04d6fa8349bba", 0x8a}], 0x2, 0x0, 0x0, 0x6883457ba4313dc4}, 0x40) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000400)) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800a0018}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x200, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1b, 0x0, @udp='udp:syz1\x00'}}}, ["", "", "", "", ""]}, 0x34}}, 0x40) 00:25:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffcd26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000600000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:12 executing program 4: r0 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x30, r0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000540)=ANY=[], @ANYBLOB="43d76b52d25804c8587eec6a05d47d12e80000001cb2656036c5091cda618ae9ffb3f5bc01d1bff0020e2240ba53ccecd73f4c74c39489b635bf4d5753964a5f6dc0cb262e855b8c44795d954e66c06bcddf6f1fd49140f2c151f2747d38be2590fcc5a60800000000000000341484b7510300447268825d4c3d71bbca23dae6f8f803b6486c4495f7c0bc6042b2ec3958130859551800000000f3be989a4097df0693961d647b9468d9657788128607b9b46be1d458c0bf24c3e235c008faad2357a351e0edc74d75b6e619133729772fded4c4f42e63393fa68c17163ea64e09d4e1a4ad5e119d235710bd2c68e913dfbb536e018e869db1f28dcff90c80f33aae7ee4de77b9f44f91b5caac3294037f5cbfa1d8b9afdfea1192e8e8332c242728e5bf6d25f613565dc2c08c894b19a797c3"], &(0x7f0000000000)=0x2) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) r1 = syz_open_dev$cec(0x0, 0x0, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0xeb4a40df20d9ee3b, 0x8, {0x8000000000009}}, 0x18) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000040)=0x3) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x40046109, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x40046109, &(0x7f0000000080)) 00:25:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000020600000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x40000000003, 0x4, 0x4, 0x7cb, 0x0, 0xffffffffffffff9c}, 0x2c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000003c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000440)=""/33, 0x21}, {&(0x7f0000000480)=""/19, 0x13}, {&(0x7f00000004c0)=""/74, 0x4a}, {&(0x7f0000000540)=""/181, 0xb5}, {&(0x7f0000000600)=""/178, 0xb2}, {&(0x7f00000006c0)=""/77, 0x4d}], 0x6, &(0x7f00000007c0)=""/14, 0xe}, 0x20) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x20000000, 0x0, 0x0, [], r0}, 0xffffffffffffff85) close(r1) r2 = socket$kcm(0x2, 0x5, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0, 0x5a}, 0x20) setsockopt$sock_attach_bpf(r2, 0x84, 0x9, &(0x7f0000000080)=r2, 0x9c) uselib(&(0x7f00000000c0)='./file0\x00') ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000040)=0x2) 00:25:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffce26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:12 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000000c0)={0x5, 0x100000001}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@generic={0x0, 0x8, 0xfe}) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x14, 0x4, 0x200000004, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x3c) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x0, @default, @netrom={'nr', 0x0}, 0xffffffff, 'syz0\x00', @null, 0x4, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 00:25:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="8453c0e72f0000000006000200"/28], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x141242, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x330, 0x70bd29, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x24) 00:25:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffcf26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000700000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:25:13 executing program 2: r0 = socket(0x10, 0x802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0), 0xfffffffffffffff8) write(r0, &(0x7f0000000000)="fc0000001d00071bab0925003a00070007ab080000000000000000fa2c1ec28656aaa79bb94b46fe0008000a00020003036c6cdec64fe52fb5563bb55b44a7afd9df0d11512fe0cad44000000000008934d07302ad23fed20100fe7b0000d5bbc91a3e2e80772c05defd5a32e280fc83ab070000000cec18444ef92e475ef8b29d3ef3d9a48a170e5bba4a463ae4f5566f91cf190201ded81594ed40374f82127de0ad91bd0734babc7c6d27392ad23f2e00000000000000066b17e583df150c3b880f411f46a60467b4d57155870271bfe9c8c077c34d3c0fd5777a58a10000c880ac801fe4af00000000000000715fbbf0139021afdb4cf95d2df7", 0xfc) 00:25:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffd426000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000800000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4aa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x81, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) timer_create(0x2, &(0x7f0000000000)={0x0, 0x2, 0x1, @tid=r1}, &(0x7f0000000040)=0x0) timer_delete(r2) r3 = socket$inet6(0xa, 0x0, 0x8010000000000084) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="1ab96f00a1273b6a345ee610f65e72a5b387453fa905efda8a4f60a9df7171fdd032b6798beec1fc40f56a383a4809b7", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r5}, 0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={r5, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={r6, 0x401, 0x10}, &(0x7f0000000180)=0xc) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x9, @win={{0x0, 0x0, 0x50323234, 0x300000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 00:25:13 executing program 4: r0 = io_uring_setup(0xd, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x1e1) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0xc, &(0x7f0000000180)=0xfffffffffffffff7, 0x4) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000100)={&(0x7f00000000c0)=[0x401, 0x80000001], 0x2, 0x1, 0x4, 0x7, 0xfff, 0x1c4, {0xa86, 0xf20, 0x200, 0xffffffff, 0x0, 0x7, 0x8, 0xe3, 0x6, 0xb18, 0x2, 0x20, 0x8, 0x9, "bdde488e9e6f44b50c625a8b4ac416e10ab9f579d33634c599f27b0e4f3895c3"}}) [ 1401.808117][T15745] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.2'. 00:25:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffd526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x4, &(0x7f0000000500)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x3c) write$P9_RRENAMEAT(r3, &(0x7f00000000c0)={0x7}, 0x7) dup2(r3, r0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 00:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700000000ffff300800000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffd626000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000900000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="b800000019000100000000000000000000000000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYBLOB="856a9b40dd98215ebf07aea569d97c64d71cedd401f91ffb824f1cbd2df4cb4c13a55de44fd89884f555a56b167341338975e0d052a8175474a27ceedfd0abce3a38a0654ab7e72f73fe5d61450b5135aea8b2bff5c95a30151a3eea7e0daab80f43259f0722cd2c2ca6b1715721b8fa4ed5c0e3138e1a4c40e22786c45e9c01d4b1604ff9d011bcfdbbe3fb510a456bb1aa3aadc34c61698bf1c711a2967dec449db83f6fc527cfee97edbdb2c1b735448e52206fdcc2126de9befc308164eb", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001300000000000000000000000000f9ffffffffffffff00000000000000000000007667f7b8b6ca202e12c845a9174af67f84e600000000000000000000000000000000d3621e"], 0x4}}, 0x0) 00:25:13 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.conWrollers\x00', 0x275a, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x200, 0x0) epoll_wait(r2, &(0x7f0000000340)=[{}, {}], 0x2, 0x3) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000280)={0xc, 0x8, 0xfa00, {&(0x7f0000000100)}}, 0x10) write$FUSE_CREATE_OPEN(r1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r4, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_G_AUDIO(r4, 0x80345621, &(0x7f0000000380)) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2, 0x1, 0x6, 0x9, r3}) 00:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000a00000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:13 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000700)={0x0, {0x10000, 0xfb}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0xb6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x9}, r1, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000740)=ANY=[@ANYBLOB="c159756447620f2f833712810471e9b401e4d812ea096399d2ddc7f60bbdbb0c426a250d926f1156afba226412773357112029cfa9d8ad96e5ddf20000000000"]) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000100)={0xecc93e79590e84a0, 0x68, &(0x7f0000000680)="9214cb3ebfb1504e2ca234141e73469999baa3791cc98465dfe60ae6ec60ca003e13392397daa178a8cc47ebaca8b7c68f2961ca0ae63b16cb1830a049b48d38102c8e51306467be00a00e449150cb80e79c34644f5dd4715a7ffba6c6e0f2cb316c058f3202f0ce"}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r3, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$RTC_UIE_ON(r3, 0x7003) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) close(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x11002, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x8) r6 = openat$cgroup_ro(r5, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@isdn, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/121, 0x79}, {&(0x7f0000000480)=""/118, 0x76}], 0x2, &(0x7f0000000540)=""/138, 0x8a}, 0x2000) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000980)={0xffffffffffffffff, r6}) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r7, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$VIDIOC_RESERVED(r7, 0x5601, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x0, 0x8}, 0xc) getpid() 00:25:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffdb26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffffc3, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000013001707ed12806cd2001be526fb0d61e18fbd2fe6a5dd80009d000000000300f87f0000640000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000100)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 00:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="780000001000050700000000fffe400a00000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffdc26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair(0x68102d053ef6a925, 0xc21e6a017f5673e4, 0xa1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) ppoll(&(0x7f0000000140)=[{r0, 0xe480}, {r1, 0xa}, {r2, 0x8}, {r4, 0x22be}, {r5, 0x20d0}], 0x5, &(0x7f0000000180), &(0x7f00000001c0)={0x4}, 0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r7, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x20, r9, 0x1, 0x0, 0x0, {0x3, 0x6c00000000000000}, [{{0x8, 0x1, r10}, {0x4}}]}, 0x20}}, 0x0) r11 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r11, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r12, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r13 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r13, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac91759388bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff7d5487b935cb4db46e9a81f48c95dd5d1f8aa03c3656b9", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r14, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) socket$kcm(0x2, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r15, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) recvmsg(r15, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r16, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r17 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r17, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r18, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) r19 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r19, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r20, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001b40)={'team0\x00', r20}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001b80)={0x0, @broadcast, @initdev}, &(0x7f0000001bc0)=0xc) r23 = socket$kcm(0x2, 0x3, 0x2) recvmsg(r23, &(0x7f00000028c0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/119, 0x77}, {0x0}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f0000000640)=""/11, 0xb}], 0x4, &(0x7f00000027c0)=""/224, 0xe0}, 0xa0af5b9d3dad3c88) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x17, 0x15, &(0x7f0000000400)=ANY=[@ANYBLOB="0900174509706e98b91d0000449bff4eb4ace9c513db0c296a6603337a9bc6180ee1f7d71ce4e790d2b763cba1fc5259c1da39e2a572e0fbcbf047f6ed4d8c02adf0ff3f717cb0afca15e9160a030b9eb1106817d7895b4744cf462f3fe08aa45a8b35707ff97347cb2446ac912e4b61bd17f3b33ebb514d9b44318522458d1b8748bd0ab7fc662d9b8045ebc4e3b813d255595777fed6d609e8798ed1726a091fff", @ANYRES32, @ANYBLOB="f049c82dc988cff4"], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x4, [], r24, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002940)={0x5, 0xd, 0x1, 0x1ff}, 0x10}, 0x70) sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000001f00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001c00)={0x2a8, r9, 0x400, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r12}, {0x140, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r14}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x144, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x800}, 0x10) 00:25:14 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400add427", 0x9}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x6) fcntl$dupfd(r1, 0x406, r2) io_submit(0x0, 0x1, &(0x7f00000015c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfeac) splice(r0, 0x0, r2, 0x0, 0x20000000010005, 0x0) [ 1402.994768][T15823] validate_nla: 62 callbacks suppressed [ 1402.994780][T15823] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1403.024772][T15823] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:25:14 executing program 4: socket$inet6(0xa, 0x2, 0x0) chdir(0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/35, 0x23}, {&(0x7f0000000280)=""/157, 0x9d}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000580)=""/231, 0xe7}], 0x4, &(0x7f0000000400)=""/178, 0xb2}, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000840)=0x4) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000500)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700)={0xffffffffffffffff}, 0x247, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f00000006c0), 0x2, r6, 0x10, 0x0, @in6={0xa, 0x4e21, 0x615, @remote}}}, 0xa0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000140), 0xffffff35) [ 1403.068484][T15823] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1403.090235][T15831] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:25:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1403.114294][T15823] netlink: 'syz-executor.0': attribute type 23 has an invalid length. [ 1403.137733][T15834] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:25:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffdd26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000b00000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x8, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr="9d024a6a7f10c53a9170856be167e240"}}]}, 0x98}}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r1, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = socket$inet6(0xa, 0x0, 0x8010000000000084) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r5}, 0x14) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r6, 0x6612) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000002640)={0x0, 0x8, 0x10, 0x7, 0x1}, &(0x7f0000002680)=0x18) r8 = socket$inet6(0xa, 0x0, 0x8010000000000084) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000000)={r10}, 0x14) sendmsg$inet_sctp(r2, &(0x7f0000002840)={&(0x7f0000000040)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000025c0), 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="200000000000000084000000020000007eb99fac1192fb0000058007000000020000000000000000755a214f8601fbaf5c0b3fee12a06341a39e3200b604188847522d3d5ce8b7e8625de5be97460e6ddc3473c88f8e8d35477195a40ffac742e43240945c2e768611bacad7c55a9fd804faf6a3b9b6", @ANYRES32=r5, @ANYBLOB="20000000000000008400000008000000103003d4bf5ec381b3363d55e615711c1800000000000000840000000000000001000000ff0f03001800000000000000840000000500000000000000030000002000000000000000840000000800000000000000000000000000ffffffffffff1800000000000000840000000500000030000000faffffff2000000000000000840000000200000000001180ff01000009000000", @ANYRES32=r7, @ANYBLOB="00000000000000008400000002000000060000800500000000000000", @ANYRES32=r10], 0xf8, 0x40000}, 0x4000) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000140)={r5, 0x3f, 0x88, "05378b0cd61008df59690facece7f3eddabd115f17684a9a52f67102fac7a670ac71c2403a31a856d9d68eaefde5abd838bcb6dd1a3c6b1e3c7ea70a8e02ebaccbda33ad1f67ac1d10dc174c8ab106b98d4104d3204425029d27b815b80a8e8b2c2ab327060f1201836b4317e48e3369a57e9dd5cfa0bb137ecbe538acfbe8a85b41ecc60c39a2e6"}, 0x90) 00:25:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000ffffffde26000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1403.464821][T15849] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1403.554703][T15849] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1403.653043][T15849] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1403.694661][T15849] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:25:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000fffffff526000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1c000000000000000000000007000000440c0700e0cb1b16eb000001000000000000057f16396538ab961a89ee"], 0x20}, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000100)={0x34, 0x7, 0x8, 0x9, 0xb1ba, 0x81}) 00:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000c00000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000200000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1404.179081][T15890] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1404.187206][T15890] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:25:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:15 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)) 00:25:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)}, 0x40000880) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000000c0)={0x1ff, 0x100000000, 0x401, 0x81, 0x1e, 0x4000000000000}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) r1 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x7ff, 0x400) ioctl$RTC_AIE_OFF(r1, 0x7002) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r2, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@broadcast, 0x4e20, 0xe9a, 0x4e24, 0x10000, 0xa, 0x20, 0x80, 0x38, 0x0, r3}, {0x20, 0x8, 0x100000000, 0xaf1, 0x0, 0x4, 0x2, 0xffffffff80000001}, {0x80000001, 0xfffffffffffffff7, 0x1000, 0x3b39}, 0x81, 0x0, 0x2, 0x0, 0x0, 0x2}, {{@in=@multicast1, 0x4d5, 0x32}, 0xca67a364f8fe1baa, @in6=@dev={0xfe, 0x80, [], 0xc}, 0x3507, 0x3, 0x0, 0x9bad, 0x5, 0xb}}, 0xe8) 00:25:15 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x6) setsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000640)=0x159f, 0x4) 00:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000e00000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000300000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = fsopen(&(0x7f0000000340)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x6, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x101, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000080)=0x1) fsmount(r1, 0x0, 0x81) 00:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000000f00000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) getsockname$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x1c) 00:25:16 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fchdir(r0) fcntl$lock(r0, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x2, 0xff}) close(r0) 00:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000001000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000400000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) gettid() ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-aes-neon\x00'}, 0x58) ptrace$cont(0x7, r1, 0x0, 0x0) 00:25:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000001100000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000500000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1405.448896][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1405.454803][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:25:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000001200000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1405.608903][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1405.614735][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000001300000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000600000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:17 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) close(0xffffffffffffffff) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000240), 0x4) 00:25:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000001400000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000700000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:19 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x2305e2b7) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000200)={0x0, 0x3}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) openat$sequencer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001280)) r3 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x10, &(0x7f0000001400)=ANY=[@ANYBLOB='fd9', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000120000,user_i', @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',allow_other,allow_other,subj_type=,\x00']) socket$inet6_udp(0xa, 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100), &(0x7f00000001c0)=0x8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syslog(0x1, &(0x7f0000001580)=""/215, 0xd7) request_key(&(0x7f00000044c0)='id_legacy\x00', 0x0, &(0x7f0000004540)='{\'em1lo\x00', 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e21, @remote}, {0x2, 0x4e20, @remote}, 0x8, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)='syzkaller0\x00', 0x80, 0x4, 0x6}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 00:25:19 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x12901) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x20000000000003, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1e, &(0x7f0000001200)=""/145, &(0x7f0000000040)=0x91) 00:25:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000002000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000800000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:19 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20041ffd, &(0x7f0000e68000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffff7f) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) r4 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r4, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r4, r4, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) r8 = syz_open_dev$media(&(0x7f0000000880)='/dev/media#\x00', 0x3ff, 0x2000) r9 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r9, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r9, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r9, r9, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r12 = socket$inet6_udplite(0xa, 0x2, 0x88) r13 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r13, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r13, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r13, r13, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r13, 0x0) r14 = syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0xfffffffffffff9be, 0x2) r15 = getpgid(0xffffffffffffffff) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r16, 0x0, r16) r17 = inotify_init1(0x0) fcntl$setown(r17, 0x8, 0xffffffffffffffff) fcntl$getownex(r17, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r18, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r20 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r20}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000080)={r18, r19, r20}, 0xc) r21 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r21, 0x0, r21) r22 = inotify_init1(0x0) fcntl$setown(r22, 0x8, 0xffffffffffffffff) fcntl$getownex(r22, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r23, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r25 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r25}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000080)={r23, r24, r25}, 0xc) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000c80)=0xe8) r28 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r28, 0x0, r28) r29 = inotify_init1(0x0) fcntl$setown(r29, 0x8, 0xffffffffffffffff) fcntl$getownex(r29, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r30, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r32 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r32}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000080)={r30, r31, r32}, 0xc) r33 = getpid() sched_setscheduler(r33, 0x5, &(0x7f0000000380)) r34 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r34, 0x0, r34) r35 = inotify_init1(0x0) fcntl$setown(r35, 0x8, 0xffffffffffffffff) fcntl$getownex(r35, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r36, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r38 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r38}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000000080)={r36, r37, r38}, 0xc) r39 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r39, 0x0, r39) r40 = inotify_init1(0x0) fcntl$setown(r40, 0x8, 0xffffffffffffffff) fcntl$getownex(r40, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r41, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r43 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r43}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r39, 0x1, 0x11, &(0x7f0000000080)={r41, r42, r43}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r44, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r45, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r46 = getpid() sched_setscheduler(r46, 0x5, &(0x7f0000000380)) r47 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r47, 0x0, r47) r48 = inotify_init1(0x0) fcntl$setown(r48, 0x8, 0xffffffffffffffff) fcntl$getownex(r48, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r49, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r51 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r51}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000000080)={r49, r50, r51}, 0xc) getresgid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001340)=0x0) r53 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r53, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r53, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r53, r53, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r53, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r54, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r55 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r55, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r55, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r55, r55, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r55, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r56, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r57, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r58 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000001380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r59 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001c80), &(0x7f0000001cc0)=0xe, 0x1037dfde7b41b038) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r60, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r61 = getpid() sched_setscheduler(r61, 0x5, &(0x7f0000000380)) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) r63 = getgid() r64 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r64, 0x0, r64) r65 = inotify_init1(0x0) fcntl$setown(r65, 0x8, 0xffffffffffffffff) fcntl$getownex(r65, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r66, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r68 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r68}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r64, 0x1, 0x11, &(0x7f0000000080)={r66, r67, r68}, 0xc) r69 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r69, 0x0, r69) r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r71, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r73 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r73}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r69, 0x1, 0x11, &(0x7f0000000080)={r71, r72, r73}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001dc0)='\x00'}, 0x30) r75 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r75, 0x0, r75) r76 = inotify_init1(0x0) fcntl$setown(r76, 0x8, 0xffffffffffffffff) fcntl$getownex(r76, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r77, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r79 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r79}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r75, 0x1, 0x11, &(0x7f0000000080)={r77, r78, r79}, 0xc) r80 = getegid() r81 = getpid() sched_setscheduler(r81, 0x5, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001f40)=0xe8) r83 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r83, 0x0, r83) r84 = inotify_init1(0x0) fcntl$setown(r84, 0x8, 0xffffffffffffffff) fcntl$getownex(r84, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r85, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r87 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r87}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r83, 0x1, 0x11, &(0x7f0000000080)={r85, r86, r87}, 0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)=0x0) lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0}) r90 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r90, 0x0, r90) r91 = inotify_init1(0x0) fcntl$setown(r91, 0x8, 0xffffffffffffffff) fcntl$getownex(r91, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r92, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r94 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r94}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r90, 0x1, 0x11, &(0x7f0000000080)={r92, r93, r94}, 0xc) r95 = getpgrp(0xffffffffffffffff) r96 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r96, 0x0, r96) r97 = inotify_init1(0x0) fcntl$setown(r97, 0x8, 0xffffffffffffffff) fcntl$getownex(r97, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r98, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r100 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r100}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r96, 0x1, 0x11, &(0x7f0000000080)={r98, r99, r100}, 0xc) r101 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r101, 0x0, r101) r102 = inotify_init1(0x0) fcntl$setown(r102, 0x8, 0xffffffffffffffff) fcntl$getownex(r102, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r103, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r105 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r105}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r101, 0x1, 0x11, &(0x7f0000000080)={r103, r104, r105}, 0xc) r106 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r106, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r106, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r106, r106, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r106, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r107, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r108 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r108, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r108, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r108, r108, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r108, 0x0) r109 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r109, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r109, &(0x7f0000007280)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000c3dd53603211e7a5bdaa98205c6bec6e954301a1dcaf81af8a721cbfaba54f7aaae127c1ec5c8d72f11e2758"], 0x1c) sendfile(r109, r109, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r109, 0x0) r110 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000002080)='/dev/video0\x00', 0x2, 0x0) r111 = getpid() sched_setscheduler(r111, 0x5, &(0x7f0000000380)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000020c0)={0x0, 0x0}, &(0x7f0000002100)=0xc) r113 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r113, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r113, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r113, r113, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r113, 0x0) stat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0}) r115 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r115, 0x0, r115) r116 = inotify_init1(0x0) fcntl$setown(r116, 0x8, 0xffffffffffffffff) fcntl$getownex(r116, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r117, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r119 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r119}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r115, 0x1, 0x11, &(0x7f0000000080)={r117, r118, r119}, 0xc) r120 = fcntl$getown(0xffffffffffffffff, 0x9) r121 = geteuid() getresgid(&(0x7f0000002ac0), &(0x7f0000002b00), &(0x7f0000002b40)=0x0) r123 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r123, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r123, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r123, r123, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r123, 0x0) r124 = syz_open_dev$dspn(&(0x7f0000002dc0)='/dev/dsp#\x00', 0x81, 0x1) r125 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002e00)='/dev/dlm-control\x00', 0x400000, 0x0) r126 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r126, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r126, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r126, r126, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r126, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r127, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r128, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r129, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r130 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002e40)='/dev/cuse\x00', 0x2, 0x0) r131 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r131, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r131, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r131, r131, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r131, 0x0) r132 = signalfd(r1, &(0x7f0000002e80)={0x1d22000000000000}, 0x8) r133 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r133, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r133, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r133, r133, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r133, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r134, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r135, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r136 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000005040), 0xf2cbf66f3ab3b6ef) r137 = getpgid(0x0) getresgid(&(0x7f0000005080), &(0x7f00000050c0)=0x0, &(0x7f0000005100)) r139 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r139, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r139, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r139, r139, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r139, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r140, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r141 = getpid() sched_setscheduler(r141, 0x5, &(0x7f0000000380)) r142 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r142, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r142, 0x29, 0x23, &(0x7f0000005140)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000005240)=0xe8) r144 = getgid() r145 = getpid() sched_setscheduler(r145, 0x5, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005640)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000005740)=0xe8) r147 = getgid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r148, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r149, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r150, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r151 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r151, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r152 = accept4$x25(r151, &(0x7f0000005780), &(0x7f00000057c0)=0x12, 0x0) r153 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r153, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r153, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r153, r153, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r153, 0x0) getpid() r154 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r154, 0x0, r154) r155 = inotify_init1(0x0) fcntl$setown(r155, 0x8, 0xffffffffffffffff) fcntl$getownex(r155, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r156, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r158 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r158}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r154, 0x1, 0x11, &(0x7f0000000080)={r156, r157, r158}, 0xc) r159 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r159, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r159, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r159, r159, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r159, 0x0) fstat(r159, &(0x7f0000005800)) r160 = getpid() r161 = socket(0x10, 0x3, 0x0) write(r161, &(0x7f0000000000)="2400000019005f0014f9f40700090400020000000000000002230000080001007f000001", 0xba) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005880)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000005980)=0xe8) stat(&(0x7f00000059c0)='./file0\x00', &(0x7f0000005a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r164 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r164, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) r165 = openat(r164, &(0x7f0000005a80)='./file0\x00', 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r166, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r167, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r168 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r168, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) ioctl$TIOCGPGRP(r168, 0x540f, &(0x7f0000005ac0)=0x0) r170 = getuid() r171 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r171, 0x0, r171) r172 = inotify_init1(0x0) fcntl$setown(r172, 0x8, 0xffffffffffffffff) fcntl$getownex(r172, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r173, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r175 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x0, r175}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x1) setsockopt$sock_cred(r171, 0x1, 0x11, &(0x7f0000000080)={r173, r174, r175}, 0xc) r176 = getpid() sched_setscheduler(r176, 0x5, &(0x7f0000000380)) stat(&(0x7f0000006f40)='./file0\x00', &(0x7f0000006f80)={0x0, 0x0, 0x0, 0x0, 0x0}) r178 = getgid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r179, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r180, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r181, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r182, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r183 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r183, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r183, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r183, r183, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r183, 0x0) r184 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000005440)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r185 = accept4$llc(0xffffffffffffffff, &(0x7f00000074c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000007500)=0x10, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r186, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) sendmmsg$unix(r3, &(0x7f0000007040)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000680)=[{&(0x7f00000001c0)="4196bd72ac4f10fe07f8159c9579f0e1ad6accc9637fdcd547b2367b6bca27cd956f71af148dbce7140ac9ab82c79bee4d62f7b848cbc6fd703b8da59e6dff8770cd63fd1813f641de615770083340c320386314813330064e04e4a2eaac3e2a60441b6d248be64c47efdc0772e068520bb8804b9eb5d5e60343326c9bd1dfe58af16c0382", 0x85}, {&(0x7f0000000280)="24db0d4e757ed629bacbc3192c66b2abfbd04af96090c9ee106fb2bd1d43415d54a7c96ab8ae0e03b5077bb347d67c8e8ffaf33e6488ec62849faf8c9b462bf10aeb3a141104212e69e0e7ca9d0661b5dffa48fa1e1bbc62e5861088405b24f16cce6f6b08256b53aa52140f046e88b70180e590dbd468a9f792dc8ef1a2a220a99a537e8b8ae685023d76fec4d67e79a5cdf60c5071b8996b9300a3baf6bfa48d2456506a84990eda3a635213bb850d37426cc9cb7c34f5b7e4c01d977a3fee01baa786240e89507511255d67081b2f99e9bb622d67e92ae1962973dc4c09", 0xdf}, {&(0x7f0000000380)="1b8eed04b60b377383edb7cea7373847fddf8f7717f45ee1c8892af81fe592ef2b255a768ef044a25ab79ed5900fe11ea3b3bf22f0996af5fd6b70053d4059f9b6f5d2984d7fcb2bab1edc59c1e967e3a9b417838841b0d56e28d057b394db19acf9f8f1caf035a4e4d48e396ee407c3f5c9a03e2ed55570f0f9cc2072a4ccc3887b64", 0x83}, {&(0x7f0000000100)="37b426cc9cbf26092918c9571363665819b78cb7f60b278c9337eca09faa9ff513ddc11d3ff114e7f8dd64f73e44beb09929ad95cf8997fac78e8ef76e50d27507b7abd473a04dbd4bcf4cebed3fde12457e9e1439ce491ddadf", 0x5a}, {&(0x7f0000000440)="dcedacb54cdb81148649b657d3cc45f1ed93cae73383d2ac77072227af8650db1e489794ad5f8df3b82151a957ff875815d24b7aa922977b74b6bc4202f37fa62b656556569a1155f0f58f212095ca9359fdfebea7a072ca95166e70398face7ffe610d2cd097e9fa10c8b443e9ba1a210c3aec4e799d0a9c2a509d843eb1c9580d693f931200ddda63eb6d80d8648cbd8d755e2a2a8666e2c1892bf14116b477767e9", 0xa3}, {&(0x7f0000000500)="1c5f7ecc6d7516bde90c2db1aac9ea714310de1c7ab1f283820522661c5f946ad38e729ab687867651298b0d2494c2695c636ae31fd333f176fc5f72289180f44b9b303f76f41089ac132ab3b8fb1740ec2f9791b98cba3b5411599289645a8ea383c2854a9dc070ab8d0b85e53f92dacc23b6a7f350aa5158cfd87396085d3148a92bf1acf01ebbd7c1", 0x8a}, {&(0x7f00000005c0)="2a94501a84b25dae7500a76a0bf224ac86defb36530081edffaecbbffcdb211d4a1673318c94dff74ac9a6b9d81daa7310e405077be5c4b0582c9cbc13d029c7a7fb41e6cba9982d0f60cd89a5581cfb2147d5509e51fadd51d5227b93ad743475c2ba4a05fc8cd1a60333e0be59c91bf73d5a473cff3bfab162c8d08e3811d2df9e84fa229dbf26672c0c8f8259ac7dd575094d9dd1c7835e5aa79a068d6317f1cdbd3b2b420776d033806f43f37c43c87897f8", 0xb4}], 0x7, &(0x7f0000007380)=[@rights={{0x24, 0x1, 0x1, [r4, r5, 0xffffffffffffffff, r6, r2]}}, @rights={{0x28, 0x1, 0x1, [r180, r181, r182, r183, r152, r184]}}, @rights={{0x1c, 0x1, 0x1, [r8, r159, r9]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r10, r11, r12]}}, @rights={{0x24, 0x1, 0x1, [r2, 0xffffffffffffffff, r13, r2, r1]}}, @rights={{0x18, 0x1, 0x1, [r1, r14]}}, @cred={{0x1c, 0x1, 0x2, {r15, r19, r25}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x120, 0x1084c5471ab64ac4}, {&(0x7f0000000a40)=@file={0x1, './file0\x00'}, 0x16, &(0x7f0000000b40)=[{&(0x7f0000000ac0)="24622759c2ed9092a7b495899b1a66cb56b7910f58a8503506675582d0081db23a71603103b22f4086a0f09a4e32d7d42cfad83d", 0x34}, {&(0x7f0000000b00)="10d096d9d02f36b514edd671fc8868b535d8e676b970a1487b657aee3e96faf4f8f00ca515bb787f7d1ab17373a7e1cf098d", 0x32}], 0x2, &(0x7f0000000cc0)=[@cred={{0x1c, 0x1, 0x2, {r26, r27, r32}}}], 0x20}, {&(0x7f0000000d00)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000011c0)=[{&(0x7f0000000d80)="28af5b976fc8190c39020480c2555d2dfb3f4e3abe92cf8364d455f8d457ebfb75efee19e8fbb8ddec81dd2d713070769202e402c751dd0a8e93ad3e14efafb31d8ad8c31cc28682b92f36234ccfc04ee022ae4c4007cfcd046c20c0f3070f72e6b1df35395e8d15591e12576b0602b630b2d488", 0x74}, {&(0x7f0000000e00)="480e", 0x2}, {&(0x7f0000000e40)="2a7e9f46fb6b992629a3ef885f2ad39bb41b12e3d77a4d83feb3490698a58a9cbf6ca1971c014c7a368c141c780db71d6e88d972850adb128524ef4fdb9520be3a5592fd2bafa13c809dd25dc129aff4db66d5564a793b117f7974d4ce2d65bd63e4216ecafedfd1d7405cf8d4ade89e7d909689d6c05c", 0x77}, {&(0x7f0000000ec0)="2e1c01fc46ea818934a20aa15ad454e500", 0x11}, {&(0x7f0000000f00)="2a059b29f26b5f1f4d5277ce352cce3407f6c59cfbaef4e2c8e0617e9c81372a00b86313d04c5c6424c4da5098a2a83e6ae787532b059b4d4b8330b5c272faa7341e419af770966fc83a976a43302ae626607393534fac76af7e769bfc81f060258330bcf64362dd28e87b2dfbe1c56d6f3f5e73c551eb9eb520b4ee11145c226897611de1d09bb0d3300f007260491ddee91586a4031fb7f0d61bc256c071d9a68477a926071e26c597778ac66f1370a26abdca231bf22808b80ee7da2c45987d56155d79a0bb068f3ec87bed0fc83b6f983e2a7e4930fb37da24b2873a570e280e3181f3011497be79df0ece0fbc", 0xef}, {&(0x7f0000001000)="66dbac79aba98111fa57d94b22cb77e6acf736970ca372d3cf91edcda8bcb1457e8117c9c85fd1127b8ac43996c56ed1e5b213cdc689f5fc91172e39a853ddece08b5e43009b5327fb9f92ad389f033aea6dcbad6dfd807c2123398f53633129d1a30e1f20f2073802b0777d322e66e9b6d0c14f8efbb16d10451e60554658fada1cb76c3350f611e4340ae863a29ae170cee95854cfa17c7292f8a0a809607c8711d0ff5a7373f0f295832b907f402ab8d6d58526cd0431ddea8f5b2d919a998b871c0db8fe5bfef604a01f8e25c80d71bf8054cec7b0726310", 0xda}, {&(0x7f0000001100)="2410a8d4b5a3750c552db8e2b8044d399bd724b4500d56c37e7e358e6db91fdfe2abe87bd3190f036011f405f32b461c730b1262404e318386bb0636eaa6b4e0438ab23c3ff46246aedff370a1eeaff657b18dac54d861430470518bf05e9366fb83d1b60721decca65acc3ced0f03e691f15b7c771535035d3535382abc93a97e8985c31f10d64ec8d2d5622160f37e7e68cd52c40f6e3e6d447f0738dc46b13a252b85b17fb53157dc12ecacc7558a56febc0eab6814d05815", 0xba}], 0x7, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r33, r37, r43}}}, @rights={{0x28, 0x1, 0x1, [r44, r1, 0xffffffffffffffff, r45, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r46, r50, r52}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, r1, r56, r57, r2, r58]}}], 0xc0, 0x4000000}, {&(0x7f00000014c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001540)="e68a6dc03e428dacae6ed8ca64aff7c3ba9e5afdfc43845653a2d7f09cd3daddecb66a9468cd3cb20469c75fc774d39bfed6f284d9b720c72696e7cf7f74be311cf6fbb03ed2", 0x46}, {&(0x7f00000015c0)="bffd0de11695cca4d079eb033c7b916435edb567584d5cc724aecd71d494596569c49423f40ef622549db34f4bceba65168528597ac8c92de5aea15c736c7ff11dfff21bb9192623bd6a2232d4c504b0f4a10cdc64e847807424ac214168a0f42c774a93f3d73ebc074ca4ea847fced290f98503f304811cfa50df5079216fb8af3cd90131edfa11168d6857fa78de31a29cfd0bc72a6948ed4f3fcb86ac80fab00b94eb8e295ab9b82a882a7aa26bf2b674a75eecd7c3d3c94857ced3562cf6a461dff587cf6a55266b721c6d946e1c1671e1f1ac0fb7d10e73755479ee31d36987ffb5bec5f435b0a650436bdf6527f07d2f538d2ae8", 0xf7}, {&(0x7f00000016c0)="e31627e30c3a32caec4df7dcd4341969e33987d60bcc147e3b75144ff28d52c68395eb2c7764e7d54ff1d87d7bb3023d80c84af896c07137d99697ebb466e5cd7fb71ec3b8463a55df8cc268a50f6a1b8d14b79bfedcbe5c2dda547e528c5e6ad06e3efffcaabe3dce4bef04ecc68156cea89774761e305c018b6e937eed6033764d7ade9e63dc51101f73a573f24a748f3dcd4d86e379ced0ce7b", 0x9b}, {&(0x7f0000001780)="d6a6e6be862a611cc9ca60ab7854e25698582bb45fd3fcdcc5bc7f", 0x1b}, {&(0x7f00000017c0)="6808cea5cb74a41b7c60c762db2e200c08d87be51eda895a1191f571ad89c6a09d21bc9471aa9438933c448221843944278fa6fd58747d6d9a073407bfd273bfbf5534f20c8443ad94969ca5b2242ae021071ccbcd986641588182b19f993e3ec35ea2d9a726c6348479a5dee2ea6cd70991e74fc3c71a4180193cd77222ccb66a321e97a64d05fcfcff87d1ff4d6a33e98a586aa637d8e6ea4f2e09d4544af3859b0a1a595f4d1392bedacc3e447021232305496d0dead063", 0xb9}, {&(0x7f0000001880)="a427984ccc10754ec8a33df0d9dfe2c47ff69a65b5d38a1483c11c3544b4e904aa8ae73cd259a0ecd002a94c3ea4e36be98ae7a10d2985f8d9bb848bda55bdd6a7c594c0d5577b45796c1dffc82954104f72b8a6767055728f4ff473ed0c5a4d66ce33a22802295a3598fcf813c1cdcf73df76c1", 0x74}, {&(0x7f0000001900)="25ec6b22726a35d8428ee9afa38d15dfe6c9de21fd674b13c9f24efbcd797880bd1c8726afa04b0b44049efceeb4eb507499a1ef9338fde261a72669a993e9ca14f514bb35519bea86d08efa24a918055da33db54b15e9a03b8d30e8c0ec1ad86eda112d6a24ed7cb6248c77521f17263c80ce1be4201c191b56cc301f289e05ee54e13558e0a63c1542539363ae75ea89df583961344a07e7667da413ffcf4df617139bd3b04a17bc5b17e14ecb9b", 0xaf}, {&(0x7f00000019c0)="a184d57b7e09c8916df38c4b3c742d00879ea829fd0111463e083a2d6c94566718ba803699928c2196c9808656ae49ee10e0931ef885559bbe053793d7a3cbc00a2d92d7ca5e6a6cd974a7947377b99702e683dc8c909e9deec9e2dc885a96e37295848e340038ed063d91fa266d0a9b28b21dda2d0792a95a0864d5481d4b31c1a2a30f67aee77225aa04c72fd06e4e22fc00242d6e90ea6dc606ca507e3cbe894d4e71961d0b0a09d322b450155dd221aa4f534af05f0e00f0a816210de4f31ebfc101c0922edb4f6d99", 0xcb}, {&(0x7f0000001ac0)="f3d4e70f7365a2cdb8b5950af47ecb78ac141b16bad286851e00af2b9cf495c5ad50f99aba7b7022790a32340e451e67f3441c1098d3371c1609c54bcbd824054742a3876f25aa87de1cdc6078285657ce8c4e9b306603ca3f55b65f2b5d33b5016352e81eb3ce0d37b3b9e29690fca577ed2b01b97301bd054b3624bb0a1deb268cdd3f7247c0cf08f554154601355f47bc414f2427c0f87a288590d70b6181335168fe70d94c0aa7fd81c612e9756ce776b9287b472e3d570461007fd42abbad9b263490af69b514b6a5c7d307f18a06074b1b0fc2f1fde26f612e78ba79756aa7", 0xe2}], 0x9, &(0x7f0000002140)=[@rights={{0x20, 0x1, 0x1, [r1, r2, r59, r60]}}, @cred={{0x1c, 0x1, 0x2, {r61, r62, r63}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r67, r73}}}, @cred={{0x1c, 0x1, 0x2, {r74, r78, r80}}}, @cred={{0x1c, 0x1, 0x2, {r81, r82, r87}}}, @cred={{0x1c, 0x1, 0x2, {r88, r89, r94}}}, @cred={{0x1c, 0x1, 0x2, {r95, r99, r105}}}, @rights={{0x30, 0x1, 0x1, [r106, 0xffffffffffffffff, r107, r108, r109, r1, 0xffffffffffffffff, r2]}}, @rights={{0x14, 0x1, 0x1, [r110]}}, @cred={{0x1c, 0x1, 0x2, {r111, r112}}}], 0x148, 0x4000}, {&(0x7f00000022c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002980)=[{&(0x7f0000002340)="9a06595c840514572990786a126ace0b610f59853c5316868d858bc252b6949acf09eef10e4363e9bc2db9018d385046e24ccebd21321d2e49310ae72138e0641d01b4f6065053271de4e3815ec166c13f39a12db439160f46569460d58ff5732c850c17ad454c89c9ca9ccec657a6d5bea67c2844f46dab5aaa53a037e30f711c0008605bc19acf59fb5f59", 0x8c}, {&(0x7f0000002400)="de06a4d433938d6db66d7b0c41c9ba27e8e61362ece0702c47fbabdbaf4a8e28b5f1a084897d5ac4939d80488a328ddc1fe62ea8cf1fe9ecf6efb2c23ee5310364333b81e50b84adb32479217acf542ef597548f4a303c6ae51cfa9e0f8955137bc78acdaf5013996d43d4e1636fd7fb53db70427de7bf50efc8c20a4fa5571b8c056b993b684c03eb2ed8e528ff6f4495d31cc28f975706de2dea7e8c32e5f8b996db24585c99d60c21c873e7381f82df1175203096c096367186fdfdb3d5fb4513392d6ad7996467d4a2f688e613df43a2925d864f5fc0e93ec52cc85d8859", 0xe0}, {&(0x7f0000002500)="6c576372bc89f17ec7023ea29d356432d4e9006f965897cf9b60d062198738385002fff24a11977ec4553b44f91536fd9577f7eaceb6072635421a565c01ee97fd3b7040e3f774f716f9d7478cef93ac49973651a63b2fd61a9de1985436f1f2b6195768c59e3d98f47a692e7b4b756132d0d8a6fb28d4ca965178405ebb8a3a822cff6fd7118db95cc0cdbb9bfbe48ca06c7bb02faab1afb06b5513ab01778b2cf36212fd2852855bfdca8df9f94502c11b42ceeb8c08a75e9108cd468b9ff2a8cf7b917401", 0xc6}, {&(0x7f0000002600)="4ebe7c57a13fd052ffe51f2a5abc6f04bb43740c50472387b49f5155fd5b7dee9132e462964b6c96b26fecf08df84d0d08f3b41e4052fc1899d965e64e6fc9887e7ef12329bc85b87a9ac75b78b7aa80543a8ee97f8133f0f61b1d9ddf89a1b7bd98b0c63788ec2e5753531a67f57a002316a106394fd72b4ab10ef9150c9b860bd10fca8987fbafab81bdcaacc111c5dd517e1c4b9610d48d8ba4fd00e582765180f1097036f95312daf1371e9a9cf190164a0d81ef4a94c55e455c68a4e00c600c9f2845cfec27629d2cb6d3bd", 0xce}, {&(0x7f0000002700)="4ef6718c9c69161ec64043cd2bfa39e2f83232922f205a4bdc4f08edda15c3412ecef12d35c6e7cca0f081100629212ee637c3dddf2f3dd90be67790fce38a58a3d2f81f2b0d7fa2137e8d6d2f9dd373923fc7e7c189a06f73ef411ec065cc94e94d706801e4a8feff73d71f65dd760c783849f25d158baff1e0431438ed56bb6377aaba05e1dd141470d37c412a91b974bd6efaf5a26387b6b2530e66879f6a9394f5da70b6", 0xa6}, {&(0x7f00000027c0)="b7baee09ec03e637f6e4a9ccac5e7aa971f738da3964e3932bc3614ff352131d3e46bb2b8914037fefb3817e6bf9d4fc21fd94d081e247b49a7942a986fc53052402cf9c5ff12dd5105f437f85c18cb02dfc638fd92326b669a117dccc2898a280232bcad46341eedbe60439e5004c706d7b72a445971b7b4d682484e639b2b3a2ed4585cf902d70aa19678e6796bf729b1856db9c7b9a6e45f24d18615b3c48e3f8044a58a357133ecddcabcc79fb5343293f1ce00828873e413f72ed7d0381711793a41b629621e247b56ac2ffeaccea00dfc6c46e7fdabec3e9e505e5074065e2898f073b1538bb18ea8a57e0c334", 0xf0}, {&(0x7f00000028c0)="ec45e5d52d800db51d7c5703d90cafae8b5518d14ef52a41470669c7f3e144b23c16f5f69b553737a5e44538df8fbf670162b7e2d4b75480e7086eedda79b7fd65abde4f91696e35b56e6214f299018636873f7bf87bd1012ed8dd4fa61f8cf8499d8208cfdc49ae1baacf729baa4209fe15e5f43681f229128c77aa556d2ce43c8fb1b4bf0a267c140d728cf16d6d61", 0x90}], 0x7, &(0x7f0000002b80)=[@rights={{0x18, 0x1, 0x1, [r1, r113]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r114, r119}}}, @cred={{0x1c, 0x1, 0x2, {r120, r121, r122}}}], 0x58, 0x800}, {&(0x7f0000002c00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002d80)=[{&(0x7f0000002c80)="3b5e1f096859b83032ee40d2b617df33651fb0093fcb1fcade0f9fbf4ea9a7b0bd3edf5460fdaa3f766a48f5", 0x2c}, {&(0x7f0000002cc0)="9c1fcfd204eb8b25d8d26b4c5dbc1261b67e117cf2bb79188848a0f33e0c3449493374dd3e2bbb389eb8dbd7e7691e774f72216a84714e60b7c0376d688ded076b235282cb755b8b39bd6dc8256eeb77efde31d482fef60094dc425823ad79d8efa186e76d4973dc9160836f570574b5a60a72bd43aa4507cdb8ecb21d7a43429b9953d5f9753b564fe6f95382ef", 0x8e}], 0x2, &(0x7f0000002ec0)=[@rights={{0x24, 0x1, 0x1, [r123, r124, r125, r126, r127]}}, @rights={{0x30, 0x1, 0x1, [r128, r129, r130, r131, r132, r133, r1, r134]}}, @rights={{0x14, 0x1, 0x1, [r135]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x88, 0x8}, {&(0x7f0000002f80)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000005000)=[{&(0x7f0000003000)="9f178a92bcc18052ddf4c1efa5b51f542dd30a2df3efc1f421b38e2f342248ad0fd156a09f2cf4034ef458319f00665070c817377a276735b5c5fd7936da871208decd9c8496c479433f13db4824848d089ff3ca0ebc22012612924c1ff770e5398b48111cf0ff229c87da3755bb94c846d1cd77c7b96ed4717914f69820d89695e665d8b75b0a2f31d0c8c00905a46b181039673b46ae4dadd201c6575b0995f9e929e70a341facc0c5d00655304e55332f804683c1263e66e2bb2081e570fb51b9a8054bf5ee350c59255d316460a0d55e7f0471c592409d473ef6c87791ea2d11f14ab02fa7d2d1f97d64dacbecc232d712fac6b633e708866b8afec35017965a64b23206a3ddbd0770049becba4e1a6477f8ef1fa00932dc5e4ddd6c7cff7d8c0b1edbc5507ad0e3e51b09c3154ff9c79170ed7e8e96de4aee5cec8e8192094d5d9e295b2a8f770635692ebaf3ab99360fa924413bc308619b0f9a912790781465716111fe5b255e8ba789994d0343d86392827168e7433af08ae42abc09aaa41ae6ec9a6016a4e176e58edbab1151cf24b35bbe18c4a6ec64f8b5ae197d3d79fd130cc1cc4b25e4d8d0fdfc59c2ca196c4c2784794e122667b9b0122dfa64ba34a90c2ba9d2f5cf89d46d228adb02a40a0d679bf4d457ef4790f422e4021c090e97f36e778be446f3ca46bf224f73efea7e04efbeb662ed314f295e0c3992f6b1d992377f7a035ed2ece1b697388d14089b2af2eaed79e35cb23c20846bc5b05902ff111f56e22316c3742ddc3735989a068c7c63aedbf70c821446de16cb4e13f957149b13000c9dd8707406f42d88fa0478f296512232eb57b4ddf493c324c8cc6ba49318b8c95041c4b9e555648341586122051f0eb48ebfc9d1465dd4997802be7774b7dc9c6b908b4b7a2cd1c2db950d53d015dba25aacbf16eeb3f01e6ba84a20375c04b9c7ad1c3a3b221c31430cd02fc3f35eb830f7c76ee1924e122b893c26a716d5ed5ebd7444da73cb3231fc627aff1b4b0ac522f446b81fc1677cc26871ca26a41fb05196998dfc1356704adda1bb245de60c4a2550541b389dd6f5b2239b7f7c33f4867f77b33f68123d349bb875e55cbe7f53d152b2e9f1351a54911927f7469e418d169cc159ca45b5cbc79151bd9d2119de3a0617094826e34b35344e35a8595ce64e000810eddd49d9b08afba39a6b979b9bc18b9c4e913b2c0a1bd05458933687436f2c0ef73a1cb8ec0baec6f416172ead41b963e270a21c1eb29dd602f4cf9883de204024660a65814c0d5301caf8571e0ddd847a2f6105f038e3471c110c8867b2c187e9ffc890e985e43fbe9fc8613e44cab43682a2a41dce8ae952ea5fba911572246bb1a5aefaa50eeb50c67843e7314e8517e6191e97c391a4fcc2ef54fd9f570aeee51bd78081367012081865ffaf16ca75106a7d0baaede10935b60a467f131f35a4e9fe7a2c71aea6e3eca499ad7118f99dbb4960448b6bb4e692ec765c2eb48dfc4281f085ed7fe68e2f36affb9ede63d8dca83a3f1c360491eb609e5d558af933a5e73af4eab122d9a985445a3a9a069fb7db102f04fe016c57795233fa19b1572d651ff5084938b44673a8c7dbf1bf513d1cc90b6291ea0bd98b5b8a78eefb7c762e98816179cd0e77e4de61f5ec8e3860627a1c600e5f9ea369cb25010b0d7433d9f78689057a0869c1665b4584abb2cc33357d9e9c090ee18d1b24992e3877da04c723ee999de0aa288cd77247bde3b463256e5cea88bc57048e625e1f47f37b267167d86d47576fae6aec5247295a8e65f8b8dd3a29d9b5359f3bd233fbb91c3aaccf9d4c993a2d7e7927126132602e26242243479c04a161e973213d4a2b991ec45f5fd7757a0986322e7cef1c09beabf2baab919f96dfc5d03df7b234d322b949f6637a1c11db11b1f3788e28d028570bd67467e4165f29fdf899a3ac43d35294861561bd81bf29cb051cec4eccacbe7e46ec4fe879425c0f6a21a536741c04ad1bc800b304ea14917393c015dfc8ab63e6b709d22af5c5e4e671e3cad71111ec76bffa79f73a3e2b57c2509c48a03df4c8dbe299b18fac30926a3dbfc86bb93ee44493b2203d8fced4877b9eda94f9b765f9f08e6d792d07ac1897adc84935b033c25db5811376116ce7d84ea8f86c5f55aff57f53dfd6612c733c47f1ea78eadcf79bdaf23bf47969ef09b59e5d3a0937b8ef36f9f4be93ec4b7d13d80e28cb320d930e1547889337f93824634931e156045c9965ce06258a396ad537e13f2c282abe9ab7fcdf75e6076dc29e512e6436d76db0d31c2290c412ad3211cea2847c841a4ad1bbf9d66f109340688d33961ff1c9484f6d3685f9b9a9e8914e9c446cc5d3dd18aff258ae48847e121d5643ca51cc919e658871e7fe8df4bac6029f4e98d9e27baf3a201e81788281b32241f175c166d0708d71257074a8caaebf33fd111396df2438740b84298efce434c4a0752e9e8cac991946c383f814092c7b18dec7ff0551578ffd99a6cf0e2ac452104121fc58ebdf9b1377f44c8282f0f2e85b29fde8144631a7b11fef142420f6887801aabb7f56191398288190a2255df8d155d0e022809606330961c73c3497271c954f6519d6eaf157412c9f8abb98b9c44bb3081339f378d262c5649dd9f70963549750ed9b1a481a0226dfd9fefd028271a7de519549a226450e6137f2c4c7c4211fec33a46cf7ad5bbeda865193f6f6674451d6a06501e9d5b3a73c4057f0fd646abddd7f2f4f607d58a1cc664ca7456edd6db0167bea75265e1c12d2d914b57cf042a4ad32b9c22ebc56d347a95653324226f93b928d11bf4055882d061f4cfa8cd93c33a296b0bb9eab0192508da1293288a13e0cad07d863c0c06c133221b0f1f5ca353e01e1637ee11f173a120abb18379616375d63143dedc076b8cecaf4da8d9544d99be470e85acd63043a1c2b22e84a4d2ba18f37021589598a56e85fc2490e292dae9de1d1aafdec685985d11763db2a42d1c9a6ea250be91047af439f93de756567b41a53b0dd87b6efa53d47d24566050a51cfa08419e336b6f1b96a9b9ce5829520391d1c890225d25ad2366774c6db6630d1bf080b67a897538fcc1258fc2b9e6cbf0d94e6696981ae981c669c536637bc231ba9d0319d2414f641f98f40db8e98a8372cbf964f5d2e004dab3b7a1c434d029649896a679b1f9b82b05c7f354b37fa518ef2cc99ccf32a123bcc94e2ea1b2fcebb01455da15a32c7981113260a3afb932ac360baab0b042ca12fea54bf7963e431036008afd3718b89c4083ca8d20cdeebadf373cae161d4fec50a505dc5736ccc8f92047a69bab8ce816394ee24874c0c420471681ee86414a19e27c6556cf0fb6f4ffdaa7a822a0243773dbac616286c15fed26b71ac2cb3da101c1686a42f78d0d4102ef04ff9c6295e7a9d32d25f43a976db070bc29a8c1c33ebb69f81005a51202a4168aa38503d5fb733a75c704ac3a3216ce30798e04c4b74fd003224aa6edd73cdd646e80901b79b8039e302f5a8ce332095bbd4938fd9e301d4a6096e1f845d137f4eec804fa872c99f0cdd1d9b1d615d0264ed5850c1811f21eaa18ecf49bc97315de8f0bbfce4436773d09a224eeca20f37a078ae8cfd9b309818a5fc9c746f28fb46d04e62a416ed35bab879acb75ce1169785c456964e6812616619b313c0c56d3b103267a10118631e6e5edf1fa5a39c43590d8e109bc787480c78553693190fdd2f4adf9f082ad34d1013a961086593b9c0197ad5a1ce0303e8e3cecc9d5f4b39c2f8b3ab01866efefddbd50e2d5a1337441454ff09d435e7e89d34cdc467ce0ca8b649e28897702cfe46ba79b0137f0e147a803181d992817c34d3ebd0b0829a7755b1b2291854e2013224cc180b1d182d7006c1ec4fda671cd8de8425d900577178126e033af2c393714457b8e6b5b560472b0fa29b5e14e88543b4b4edce7645547c5fedde2f7f87f739cb6b2f4ec484432133a066831da0cbbf73019851312fb8891b964468c5d73b4bfaa27075a6824b6ba6f219847e4322e048d7f863c7f304faa2cd48b9a15432b28006ebd7a907a51552bc30e71f20b3bb8179d86b34546c33984b975ab10b6c3301429745b10d1a9e9f186c0f0451711b583579f01c7dc95522a7aeaceeb1db5798adff334afecd48117175f33b8d8fe04f78e712e2b9a7a8432491214129ed0e9cecaccbe2ad46dd1037f5886c9b4d4464f4333d82518bb83af79802fe977b063f5c7ddc35748772c739cd47ccb2d54353bd6804e4428ceaa4f4bfae1e1093b4e590e7738d74a464c80e853b4c15b39c86bf631f05f2c0ff5eb6ff0ba8d88ca6af98bb86afc290c979601f02d9ee656a06a1b11857c53cdfa16d836878c56effe009bd6de5c1089c8bef3c4ed7e55b995f79f15cf6f62abe3545fef7a11a61843e4a3be5bc18b58519c3b8e948719def4ab164d3c864048958b92f0182426ea05e91b178e3e2e16acec9e4afffaea8e1a3293dde16ff6fbfb58c4e26c77efe28783a4c1076e1d460a38aba10120864ef175d1b3a447d666e4929d593629a6daf86f3142b6bef47b8440aacd92dba7f23a2b6fb8afb2d8de6e63b0a43988044af4cc988ecfe9bcb605a08fa9ceae26547a49fa8b79f2e2833744ea8cc44a888e470add1a048f8968bf47929a697bb4460784c5ef41c43bd86ec607fb23992cf2d4d9a3f71338073f18137498188dcac78775f1a56fd057443f291b402040c12328311bfc946c8ccfdcbf148eb8551a3f324b90915de5dd377a0c5e100e1492ab351462fa6bc3e213960d0a313df265d16392b19b22b11941573f7f2387140ab685a7aff28580c85372abf3d4ca24e01e1a1f7e2e3a89c6cfc011331a9873bf9a284139fe460616b16b1cf11cd6aea5e46ff709e13047adb762eec445b6445bae4f50235c442e993b82a7911f4b31556ee295e5e4880d822e004db645ee59aee806539fbad9715cb2cff524a0f94099b9de5c5baa56ac8f0ee0808b4e94dc639fef5a3d3f3b66c7639a4e942e359d488d75d58c0b359f0a1d9af859a6bd084cae14c251841a16321cebee2e8eb4d87d6332281d8c1c3bf39ade8193a481803e3ebd5f53c50cb84773c7cc0d880b5da4f66efeb16a30cd3b370f28aa066fb180689830b2d968983c19c8526002d1595e5b072b56534997d3d7ff060dc4cec6ccd0caef4b1c874bcda0e7593facc26d7abb1090b9357ee94eb27a5ad28b612114de2ea5f64c7a5b138f7eb3d61098ee3d5591c756f96da8b1fa05bb0c6b2e7cb6f9c913a565a2bba00f53ae6d58ccd013505965ad6fe284672eb725a7b933622b6b480dbd7412b6143f1a9e88b640c8d7b91aaa31811ac07d481b94d79128d933114d731d630873f289479c219c7f1b2b5505c10de17711cdac063797da47dc7830eca71842ba2a1a9e5e45b5ec8254fa86c9748af146e2f490709c825806b923623fcab6dd65d8f1f93b5e3b5252a7e4a888a7eacdb7ef3b7ec8a248c1d283dbfc014c08c5f9ca35ea7e91b31372140797fd6e2ff4ada460aaefc04d83ac0e4c2334bb22799b50c6ebeb739e1642998e4446bc84baecde9ffcd9f2995ffd939092ec3c9d5d91fba92b719ed98ad07b504719bf47442257829d9bdcd3d4252b996279f4b1b2cd4fbc58071ffc3a6d844e1a8c8aaec816cc0cf74ed2d1e47cd7869907f95822e0aae7e9caaafa61de1380457ab62be7fde985e4405db9212a00630ffa549887873181d8651ca1ae3", 0x1000}, {&(0x7f0000004000)="31857545daab63b65680be1e7d0dac96ab5391d5210104d4053a746e31bad4b6ad6d29ba0404c581adc149b9436214d00da692f5472a3a5c485a54d7ba89072f1be8b650d89e4e7d289c6acd03eb637c402b5d716248f42d5cd6cc08e6f1b1151c19d474e6503d7c0e2c838702bceb22c5a4ef24a1adfb15c890e4f025c19717e5b42374ea58eeb957d8f181fa670d83ba3aa818173345257c8e78a94bd9299ff91ada6de2add22b8442b95394c50e3e877dc98bfdc5e715afffbefb52d8376909dc0580b4a9117bb5e14d4caf13a5508f9d7973613d47ce4408e7fa451e782a739c12ed71c3f6d6234ad265b92e2e1aefb7102a6430178f4a8266e421f5755f4d7415df620493b97836177d01ae6c886b6bdbd07195ac58f13c564aeb7f42b12d062a90fd6774f0465fb507a55470893688446be66548b72b964cadc6d1dea57ab1bea4a24effbc1696d367654dbb1c074dbee6d717c7e2f7eab532bfb5a1b3d8510a75e37f23b590d6537185ad75c0e08e9d001687fa22616a8b4cac526457b90e540393d1f7031f90b5655cb8f8ba139022fad17978816f3a8e16ab78b2950e38e683960bea31afa01a96d28898e9b4b9a73909850b7a14a074f175d53e8d156a7d136544d09611b3d7f8bb379a6bb5bb039e36c118d032efc2b27547f8eabc58e828414b3c146d6e9ee7d37e28a7ed3d71ec0c2c56adef10e3806d6e339fb6e42b5250dd59f04d17c0a937da8b9cff989042b45ec9132a78f9be554690155016585c3c316420451e5b9e1864e9d330c289589aace5119bf606d3e8de58c8349947c3497ec48cbc07285e4ecc01de4bc4393717bb6b850de1b0b7655127eca17d9399913bce1d62b509333f6c4c4d076a262b76e75428ef0444852b5a64222d0948a105dc08a7e4aa24cfaec02272fe4c049b2dce2d405e746870ef64e814a2cae0fb991ff7a01eda0891020ff4f3c16ba949cc8b3847087ca90187849db503892d8d8a46021aa7982776ad60f70431048e1fc161599826f6a4fdb9524e7f20d830eef6247b6fa82471bc1a83cbb2246570ff5b8770b9a3e618e9c0fc1e21c1c8aa5499df57dbefa96478457badbb1d806f281838f208f00b1213816f449479041944ecc5d97ff478c4a9d1fb9720b2ca89ba9984ffa9292d19a0bc908e5d6f43b0fa1c9182085b6d5bbf0117f9487f45c4abf4600e0e0f23ec4953c42b4e5360a39c3baa74e4bb255eb265d2d993587c4d042e3e93bf5ab900f4b2821d795331fa2492ead79b88a40cead99be39aab71742f074d93343d3058eaa08d669d24bcf1a7ea2d8a43d632dbcebdaa81ef6161b1b8136002ef8ad30cc747a4c3cd44cbe08cc8ef40c81d5bed2faffc447d43a08944148469638532e4d4c812b8b013860721f0b8657929dc5b01b5b10d620f42d201686ea6eaaa363a1d35cc19d9ea0be9060a46b81f5abe7ceb7159e6d2da6802b3d9a55a6c7b639ad94d8308c2259a93d56de8ce03bcc703ce4a1cdaf94f7da24f0604960c6fb72b3af1c9e653789bf2cb05d6986d17c714ed1fe4377c9ae12fbc26723e72193feec82e35b7b02caa9714894e515b26cfcc2323de612ae7e3a257fa05be9f5cb5e4b4f8f6e729a9b1d88a36935ed8deb55718599b564e3cdc8a95d078fb72918f77f4c932631834f235beaecbda4f3b658ea6b7a26cb1615df4086256b2982487e9401fe597226cf5fb43f3e17d64a493064c3393f1ca386af757741c182fcd62e11889131f71878c428e201c2b4e0da9029395eb85b6fd172235ef1df9c3ed924c4a669dc5b02cf03d6c21600ec4c5b2c73c2c2ac0da459454b592438dc19c03bf046f0e0ee95b08f58cfadbc00105a3da483944883ac6b4b95536c681f5f961c5bd21999cfad1806b997381743e30e17445bdbd7b0bb9e89b4e52758f3c542fb0d5e93d05f9444435c99c7d4d2e1b7db73343dcf0d4309bd3b04c7b57416639e34e926772da2f01288e1dd484b318215fb5b08f1699f4326c720e353d8706f75614a9e8f8c592ecd7a726538157e0ec4f790cc27ae35df89e291ebcdaea7227afe16ae2f1bf1205f92fb3d73b6ebd82394e12f878f09ebaf92a8187a0d71ea588b9cf510d45fc338e8a424cb7a0d4d94dbbb46caecae3fbbb49dcb450697e6594a221fc88a973eebf0c627a61cff6c9600af5e78d2711dea850cc234f9997d27a0fe0f0f704a626211ca4d30bab1c8a326e01b38c5189e54d0a10643e4533ea78a25bf2f59bc0ced5aa0e9c40aad155637b6e2efbab3da481d4071a6c1e756affa912d7976616a2efa6950b95e9fad01b212fd00fe06247f80e6ef6eac992b65604b74b9e166fc47040991b7e14096a072d6b6c60c258d2502e93b4e1f46b435b507f97e38e34e7fd7149a7a3554f1be475f8e06493a6c1a9fd1a65c59a97ceb47daec372a78ef50d2778701800ba3f4ad2bfcc0dd9a3b45df43472769724a1373245fa2221a177452fbde05f7e8d75bde25425a04a2287c95f023ebe482f4cce16ed1884e2bd18b96915b6038ccf0c0c4b458daeea0667f7226214128556df097fef8d0af91c0c219c314a88f42d9e1eaea2d2ba2f6e9e7e9538bd02d80dfea3bb82202513ddcb746e263cb24cef367d0d8de0a9f2b3e203c5c707602d3c1e9fca1834df289c7a10a33416de31d13da72cd3d2b1ddfa6b5781e923cc32ecb9d58a303db96be958d3f3e92ef8ef6d6cfe90493f8565ca2819a7071a107876cf2729c607673242c46bc4b007f311d5df89190efba29c77d03550e7d9e3f785fff0ceb2fedaa9d7dc8a467b6793e1174f02f8599f97a34261a55aa3cfb17f399d8edd3a32a73ddacc437bc9b9268fb98357e7c25b9317540dea5465fb686675e48966ca4dea3237f92ef0b284959f357fc5dad868fbe1db5c42d826efa076b37eed772e364dc0f00097abf99e83cf088f2e1c78687da9b41637a223d122a699b657eeffb018b763fd28c0e1f05dd7b15ab9572830eb080f9915502277a631b283d89f0916891ce172ef653f28d656f69d2995b1a55cf00645cbddc784b076034c4c881ccad658031b87fc54f4cee9bc1f28d63dbd8f43503763e45828742cd9e50e59833edb4633a0d3274347c5e1cdd94a9658c2b3a4d6c49873de1c26687cd4889bf0a562b93f6676cb5b7dc2dec8a0201f9fc2df3df0d0eaf93d663125976e54b944f8b50667b3a23f7522e4bbe941cbf94a9af5ff0f2bfbd62faaad91d214d4d77ea5eac8fe527f33fc0950b7815a5982472fe091f4e0f74855781e2d6eeafc749d4b0f89d7e883ba483ef05bb6fe51ad433c10f0754df5cc1d7036a7713fc273169b8a1f20f946f4828350af1c5698ac139ffa3a3e2c5c2bfea0388d237f70a66fac13a821c9022a072603753dbece1e2cb7019084d894527a52ae2d35001c1822bb9f79fd27e1fd275078dd1422faef5bd6fa45f681b1c0b957cddce75fdaaaf663d06d0fc4a58a200b74636257f29c3a2c318e2937659a2ea37502006da463ca37ea4f1fe768cd8abd4df8a523005b6ea2825c2496e85fee27afaf979e2a515d592dc996c4c3d42835559e9196ff9df9c95d7f2f805aaa59859a5a8a106a9201b1cd38c37aefabde22bb82715b2ee2d32042619833a2670ce001d5b672290c8022d9b86e7f2773b0e95a367c70e2561335ee52eb7c42278afabd2af844db8be0ea79eabdb9c9be8644ffef2ac92684cfaab2de2d0b4dacefebe9c594a5bd63fafed231346d1c0faf94406d0ce85a490f6b8eef0463a2281aa89db7f42b36fd547a78f1911b838df0fd22b7bc631d9581a064538f34ca05cf49f712946c10fa9f738e5e421e4193b0172e7e36a0b702dbe16be0062515c801c63c27e63af6fcb3c4491301189ca5c305fa6c9f290355092728f195eac42f513a335144f2ac1c2644fb8678ac933d54bd106ccebf74680eed9c7e01f9a81cfd9c612f84a0f082dcd410912002a89ef21f676834d4a6c354b456a3fc5ceecec7048b3857f9f71f8835da82c80ffffde4cfbeca75d791c8cf605fc989587864d9e10ef1a5d02a264ec93b55068ebbb8496eb6a66bc33e2526d5ea8815b88ff86833d6d104ffa1a42ab973b031ac3f4ab540a26b20ee270592db90c6122bb57287cdc1ae58095df7951ff565d7881eea670a0353b545d87939656aed3f86e8a1fe26a494f67fd633300bbf854dd6294d891ff913692c19249a99aecc8a9e494033e9a552fea74727afef8a8ca909501cee053c79e5b55823b4b454cdec956a16f872322f6cbc422611a8a0251876e8eb80ca1747733fe107f3218af108296c4d952199f7cba96a6acbdf5bac43a683c8277200c386763d2aae0e6339c8859dd642672168d5d83771fa3f04768b6529788b14fc315c575565c10a92ff19b16eed25947f55689f28ef21fd2af68e4d2da19a2f80a088a46e23f0ab496bd66138153de3c840b7d65540d7f30ead0305636e1b24b6472d32e174c56d1b0be4d3134c2ab71558dd4afaa8276b93fe45399f655be2043e1f3a5f712c8472e1e21aafa8e52535fb9891d1b964b24f27a608446ee6fd15cf5d1d03a5dde2eaec919b82193873e58db8269013236ccbe239a7adf8d47457b13b58f156923ede8ef04b326ac58cbd31a41bb3ad9d2da6e5e970235a141a29ef928951c4c676fc305ae37cb73577dcacb48439807b817fcc104abd1d64c4a0d09782ac454c37bf62d2586f858f6399e7fe7c73f1eef8216451642b61dc3cd3c091d92e41982230996050947bb2be65402308737baabc910aabaceec3ab35004e15dc0736ddbe7b2bef36692b3efb5e044178264af8003d696e7eff2a34a54cfc155d99aaf42e970a09f2d32b72a65c0d4124516aaaa0efe31be3d1f81ce8818a2f6f13ca0887351c57bd9e78476ad4a90e4961ad3a68da786f9ed3f8179bcca0bfd6b7f78f4e3b65e03600ada2bccf19ceffc22d5f50921b99d0e53859dade057be02b22eeb332dd0eef1935c69522afbb9850867588a4b6170e369a75c9df73777d95ec12081ae56bd2112181b9ae1f6e69bd81cf86fc4a07843005d62e8b45d8cda8d41a294d096a5a8af00609169f78dfa95b35d6c3696b22755e8accdd7f9d57a028a543c50dfabc7b23d30e6c407dd4ff3fe939484810493c1545ca06d9800410679d34ae993418f984e4442dccf78047d316386bbed273ff909d3ebfe47b7fa2d5585b3905ef0b554292560d21d44dcf94e9f9a4226f336a5f406ed7b865968a13753c9f089589d1f68d9b3eea29585f35c7337dc369855f39a8c80b5c4d7c6d515984d4b0d9a8b411dce0dc837715178fea9dfc3f6a43a41bd15804fc4cb073879a7b5c76efad1d0fef6e33bc507688538e82b27817ad547517cad342e91a0a7d0be76986d1c7b71cbfaac577044837fa9f622fc1edb040f81f96880c3c710f9b64ba738ee5899d6878bbbb436c69e1cb40e50b87b118535e655dbb52f869353c9a1365b3b59e8d3aea48fd829b50053d554c29af7d1e17903efcfdffc9ce98c6b6e66aa22c8c00718c2176ba5dba858be81c00bfe3f1365e488515c44fa3c6930ad69a3d1641f88ff43725bd61ef7091cd7ac08b6a1b6c317f66169efb028e67b61992057204ae1d1ea5affac1d91234cf06464bb5834c7c2b8de953c6318f3cf3425e6dfad3b09d3406cc4dd474c7665296ed422fd9d3e8b628dcf2e111bf0bbd81a805313e6e17c22e6645219d1b1e28895e775ac0a639f771f9632b634091dac39f0936b6269cdfeb74e28c4bc844e6e560d8", 0x1000}], 0x2, &(0x7f0000005280)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r136]}}, @cred={{0x1c, 0x1, 0x2, {r137, 0xee01, r138}}}, @rights={{0x20, 0x1, 0x1, [r0, r139, r140, r0]}}, @cred={{0x1c, 0x1, 0x2, {r111, r143, r144}}}], 0x80, 0x40c5}, {&(0x7f0000005300)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000005400)=[{&(0x7f0000005380)="f70bfcf1f4abff9612960b74a155c6d583c423db042ee97bf1ad49fd52537a0b94ba01bec1b4175aa3ecd64a9615cdcf591ac9ee3b83c5ae41e0c1868cc70ff7003d3315cfb146931e313be772886f1c63ec46b8f294dd0c47", 0x59}], 0x1, &(0x7f0000005440), 0x0, 0x4000994}, {&(0x7f0000005480)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005600)=[{&(0x7f0000005500)="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", 0xfa}], 0x1, &(0x7f0000005b00)=[@cred={{0x1c, 0x1, 0x2, {r145, r146, r147}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r148, 0xffffffffffffffff, r1, r149, r0, r150, r152, r153, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r185, r186]}}, @cred={{0x1c, 0x1, 0x2, {r160, r162, r163}}}, @rights={{0x1c, 0x1, 0x1, [r165, r166, r167]}}, @cred={{0x1c, 0x1, 0x2, {r169, r170, r175}}}], 0xe8, 0x8000}, {&(0x7f0000005c00)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000006ec0)=[{&(0x7f0000005c80)="7574bc7d78968ec844c62501d8674c48ffa2fd91574d449bd1f9847b63a830a64fcd45af4fb20820f3b566a6df9c23af67c41e4fe18b3c220b24f05a1c69c49d3a31", 0x42}, {&(0x7f0000005d00)="2e1394a0445c18f30cb67a458cb486d79793fc17975c6199679314b0768b45de", 0x20}, {&(0x7f0000005d40)="2419033b80c60611", 0x8}, {&(0x7f0000005d80)="7e51a4895edd576e32a7324f677e5040e5369ecd84b6c6dbb8110bf68d0e0c238b210c1517038f8cf426f9a1fa1aa8e2150d0b9b59bf057e1b517c57cfb05eb2a81e2ba32a837e3590671435d131556b466dc5d09851110b0867c146249219079765b7050c1bc43eff04929e97da7f9c1f91dde9216125b830f3e9a96fcbe69e3d1b5afe5632c3622d32205943cfcff6e683af7935ce8ff6e5840fdc1dcd221fe1144551d7445a5e61b823aaea3a0c6802f5ed828150eeb02ed0ead7b657da6a80c3d263792ad4357f096007d088b9386ec7cb1a3ff0d0e347a4babd9a2bb5ec1862df150acd427e6cfbc1fd6ac29f27acd806", 0xf3}, {&(0x7f0000005e80)="77d767be857fe911ff5b76e598aa1926a29a27f757", 0x15}, {&(0x7f0000005ec0)="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", 0x1000}], 0x6, &(0x7f0000007000)=[@cred={{0x1c, 0x1, 0x2, {r176, r177, r178}}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, r179]}}], 0x40, 0x44000}], 0xa, 0x4000080) [ 1408.332932][T16000] validate_nla: 30 callbacks suppressed [ 1408.332943][T16000] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 00:25:19 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xcc}) [ 1408.390728][T16000] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1408.416974][T16000] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1408.427015][T16000] netlink: 'syz-executor.0': attribute type 23 has an invalid length. 00:25:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000a00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000001c0)=[{0x28, 0x0, 0x0, 0xfffff014}, {0x80000006}]}, 0x10) r1 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="40000000000025000400000005007c000000000000002000000000007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d8b203333411b3129faebcd2a31e318175b4e2f13b1912e115d1341530e766856dc51eb0f3c0c6c19b6ed183f39e331a9248090c589df7b3386f1989a18ef638b03000000000000"], 0x1c) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r1, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x500) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000140)={0x0, 0x100, {0x56, 0x5, 0x6, {0x0, 0x3}, {0xfffffffffffffffd, 0x8c0151d}, @ramp={0xfffffffffffff796, 0x8, {0x8, 0x1, 0x80, 0x2}}}, {0x51, 0xfffffffffffffbf6, 0xffffffff00000000, {0x2, 0xffffffffffff0371}, {0x477, 0x3}, @const={0x4, {0x1, 0x4, 0x4, 0x1}}}}) r3 = dup2(r0, r1) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000000)={0x1, 0x8cb9, {0x52, 0x5, 0x2, {0xffffffffffffff1a, 0x8}, {0x9, 0x8}, @rumble={0x2, 0x9}}, {0x0, 0x0, 0x771, {0x1e1f, 0xc457}, {0x0, 0xb7f}, @ramp={0xe83, 0x9, {0x4, 0xffff, 0x6, 0x2}}}}) 00:25:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000012600000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:20 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x7, 0x7}) getdents64(r1, &(0x7f0000000080)=""/11, 0xb) 00:25:20 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000000)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0xfcad) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="000001"], 0x0, 0x3}, 0x20) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1408.763718][T16028] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1408.802734][T16028] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:25:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000d00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 1408.882639][T16028] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 1408.928938][T16028] netlink: 'syz-executor.0': attribute type 23 has an invalid length. [ 1408.968922][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1408.968962][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1408.974797][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1408.986781][T16035] device nr0 entered promiscuous mode 00:25:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000033700000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:20 executing program 2: socketpair$unix(0x1, 0x1000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x13, 0x4, 0x8) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = socket(0x10, 0x4000000000000002, 0xc) write(r2, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x21f) 00:25:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [], 0x2}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:20 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3b6, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="78717ef8d9abd57c6b38b8415433e91696b374e340efc74abad428910167a74b8e20f2cd8379b7164a0c9c3beb1d1fe89334218b28fcb03eac407454c9e245b06a2530916639ea674c2eae76fc025594e8d7270349fede798a5850dc019da7d86061d5513ba513106cd0d9eed47863bcfdcfca22b6c06491f15e22835ba52bdb2a8c068760ce32b4d55883970574e0defc7dd4c578ad940df6ef8aa6b1cc13438bb29e5aae5766faaf28f4d226919ad885115c6bb0ffb0e7d3ae63c3d5187857", 0xc0, 0x2}, {&(0x7f0000000200)="5584088d8922355091d9f44badc1c1c8c97dae0046f6b4dfa85e8265c06bc5960a208ade5e67036513427afa6ef3b4d4bc6ba7c3f397beeaa5fa77b776e2b579137276cddccef7d7c00982cf53209b9168b040b2cae8f6cd2bf9d60c4a6de2905731daad8f037126ba26f3939236212c3361671a2d5b8bc8ec0817204c98cc04205915cfffcf080c09f494fbdbe90e62629bba629f026b6d57268fb250e8d944beaa13721ccad65b4c", 0xa9, 0xfffc}, {&(0x7f00000002c0)="5dcd273b22770f0399b7f3858d526db5fbff8ce38f0bdc9904715de27eec869e989b96d87043b13bccc8080d7b2b8a90c80b8d26d88ce46273a0f8306c4f5122bed088482d3dc7ad4d9fa37c3aa92a4844119694637a1bfd597581e915cbcff470a0e7c7557c7a3190bf1a17ad735ac1c3a9f576b024cbecd57759b2a8d631c7717d0b9d173556f0162b57885b", 0x8d, 0x8}, {&(0x7f0000000380)="9ac06f330a40fa447f00350c058e5d93d3dd919ba274320ef9024d6c36dbf176c98ca3ac9a3f0c230b3a3bb57d472df132da6b32d103081a87e288", 0x3b, 0x10000}, {&(0x7f00000003c0)="a13a25a78a343e543ff18fd227c8857b738dd487bf8ace9b54fcb7d2eb82030a9a73f23faf23fe93d3a574847122e96dd1b38250b1dc69d52a99b9445b0b0b442425e0ef36cbfeae294fc96f283f7502c996d896cde539b54d0f97992e052b8963cf1207ecf4b6e2e0a50c2bceb0ec4637c4dc9e447dbc22fbada400acea3b97786f5663e1cc9b896ac86d3bc03fa4a704e1d6501cc9a0277807a55ca73378f8055637c8abbb69494c695bc289f3af", 0xaf, 0xfffffffffffffff9}, {&(0x7f0000000480)="59bc44a39d38f0ba684c82dc57384237df7be86cf4b4f1dcad92eaaab1eed5843d9a8fb092e365b685e74f35f3d6c27ffc6d7cd1a55572eb25125aabd1ba165bc593dbae3057451ce52d40f7bdee434d2fe91b95074fdcfee366171dda219ea7b5221cc087a9e8d1074ac7ad6f18273b0f4d1fe4ad9f167bd917e4e0d5cf0755d84163a9e5", 0x85, 0xaf}], 0x33af183da0302048, &(0x7f0000000600)=ANY=[@ANYBLOB="696e6f64655f63614368652c646f6e745f68617d281fd17c73682c6d656173"]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) [ 1409.523759][T16046] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1409.537765][T16046] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 00:25:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000e00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000003f00000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) [ 1409.566635][T16035] device nr0 entered promiscuous mode 00:25:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0xc, @ipv6=@ipv4={[], [], @empty}}]}, 0x28}}, 0x0) 00:25:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [], 0x8}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x85) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000001c0)={0x2, 0x4, 0x4, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x7}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200b01, 0x0) mmap$binder(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0xb, @dev, @netrom, 0x0, [@remote, @bcast, @rose, @bcast, @bcast, @default]}, &(0x7f0000000040)=0x40, 0x80800) connect$rose(r1, 0x0, 0x609) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r3, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.u'}, 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) chdir(&(0x7f0000000040)='./file0\x00') lremovexattr(&(0x7f0000000100)='./file0/file0\x00', 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d76641cb69d952f41bdd2ac8bb8c43", 0x2e}, {0x0}], 0x2) 00:25:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x2000) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000040)=""/89, 0x59}, {&(0x7f00000000c0)=""/193, 0xc1}, {&(0x7f00000001c0)=""/179, 0xb3}, {&(0x7f0000000280)=""/75, 0x4b}, {&(0x7f0000000300)=""/217, 0xd9}], 0x5) 00:25:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [], 0xe}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000004000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000f00000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:21 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000440)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r3, 0x380d41e14d542a1a}}, 0x18) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000003c0)={0x10000, 0xfb25, 0xffffffffffffc558, {0x0, 0x989680}, 0x5, 0x1}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") write(r0, &(0x7f0000000000)="1c0000001a009b8a7e280b000000000000000000da203ca7455c0000", 0x1c) 00:25:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2={0xff, 0x2, [], 0x300}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xffffff7f], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:25:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000024000000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:22 executing program 4: fstat(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) listen(0xffffffffffffffff, 0x0) r4 = accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) signalfd(r5, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 00:25:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001000000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0xc, @ipv6=@ipv4={[], [], @empty}}]}, 0x28}}, 0x0) 00:25:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000004800000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001100000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001400000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="7800000010000507000000000000034800000000", @ANYRES32, @ANYBLOB="0000000000120500580012000c000100697036677265000048000200080008000300000008000b00000000000800040001000000080011004e21000008000900010000000400120008000100", @ANYRES32=0x0, @ANYBLOB="080009000268dd000800170001ea00f2"], 0x78}}, 0x0) 00:25:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095001500000000006926000000000000bf67000000000000250608000fff0700350a000002000000070600000ee60000bf050000000000002d650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad50010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 00:25:23 executing program 2: futex(&(0x7f000000cffc), 0x109, 0x0, 0x0, 0x0, 0x5) futex(&(0x7f000000cffc), 0x81, 0x0, 0x0, 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0xf1, &(0x7f0000000000)=[{}]}, 0x10) r1 = dup(r0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0x2e, @empty, 0x4e22, 0x3, 'sh\x00', 0x2, 0x4, 0x26}, 0x2c) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) write$FUSE_LSEEK(r2, &(0x7f0000000940)={0x18, 0x0, 0x8, {0x7}}, 0x18) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0xb0, "df48c9d1dcc59e72f4572270870f001a7436398c8c5345407957066e0c9a6c76175d8a9629747a64dadb27f9bc911444d9a404273cf373969bb325868d0df6c0f5420cd37abe5bf1769e224e21d95a7db70e6f72b375c7b77ab96ed42fe0ca395deb723fe68b28c768af3eb7e6b74ee9d8cbcad66a4877464421760aad3bf4415484872713a32e401f172e5bbb2fec92a0093e75966f018efc17df511ffde3a4ce42061dac2f8d8826c378f9a615c974"}, &(0x7f0000000140)=0xd4) 00:25:24 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000080)=0xfffffffffffffffc) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f00000001c0)=""/222) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[0x8, 0x80000000, 0x9]}) [ 1515.528803][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1515.535733][ C0] rcu: 0-....: (10499 ticks this GP) idle=c4e/1/0x4000000000000002 softirq=137436/137437 fqs=5247 [ 1515.549607][ C0] (t=10501 jiffies g=234073 q=1337) [ 1515.554901][ C0] NMI backtrace for cpu 0 [ 1515.559229][ C0] CPU: 0 PID: 8961 Comm: kworker/0:3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 1515.567977][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.578130][ C0] Workqueue: events rt6_probe_deferred [ 1515.584370][ C0] Call Trace: [ 1515.587650][ C0] [ 1515.590504][ C0] dump_stack+0x172/0x1f0 [ 1515.594828][ C0] nmi_cpu_backtrace.cold+0x70/0xb2 [ 1515.600539][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.606840][ C0] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 1515.612473][ C0] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 1515.618446][ C0] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1515.624329][ C0] rcu_dump_cpu_stacks+0x183/0x1cf [ 1515.629431][ C0] ? find_next_bit+0x107/0x130 [ 1515.634371][ C0] rcu_sched_clock_irq.cold+0x4fd/0xc12 [ 1515.639906][ C0] ? raise_softirq+0x138/0x340 [ 1515.644660][ C0] update_process_times+0x2d/0x70 [ 1515.649672][ C0] tick_sched_handle+0xa2/0x190 [ 1515.654514][ C0] tick_sched_timer+0x53/0x140 [ 1515.659295][ C0] __hrtimer_run_queues+0x364/0xe40 [ 1515.665013][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 1515.670326][ C0] ? hrtimer_sleeper_start_expires+0x90/0x90 [ 1515.676304][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1515.682014][ C0] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 1515.688161][ C0] hrtimer_interrupt+0x314/0x770 [ 1515.693096][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 1515.698633][ C0] apic_timer_interrupt+0xf/0x20 [ 1515.703573][ C0] [ 1515.706578][ C0] RIP: 0010:hhf_dequeue+0x6c1/0xa20 [ 1515.712119][ C0] Code: 0f 85 08 03 00 00 48 89 d8 49 89 9d 98 03 00 00 48 c1 e8 03 42 80 3c 20 00 0f 85 b4 02 00 00 48 8b 45 c8 48 8d 7b 08 48 89 03 <48> 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 8d 02 00 00 4c 89 f8 4c [ 1515.731810][ C0] RSP: 0018:ffff88805d8aee28 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1515.740230][ C0] RAX: ffff8880a0726390 RBX: ffff8880a07262f8 RCX: ffffffff85cb6f79 [ 1515.748223][ C0] RDX: 0000000000000000 RSI: ffffffff85cb6f8b RDI: ffff8880a0726300 [ 1515.757513][ C0] RBP: ffff88805d8aee78 R08: ffff88805d8a64c0 R09: fffffbfff14ed341 [ 1515.765474][ C0] R10: ffff88805d8a6ea0 R11: ffff88805d8a64c0 R12: dffffc0000000000 [ 1515.773434][ C0] R13: ffff8880a0726000 R14: ffff8880a0726398 R15: ffff8880a0726390 [ 1515.781416][ C0] ? hhf_dequeue+0x679/0xa20 [ 1515.785990][ C0] ? hhf_dequeue+0x68b/0xa20 [ 1515.790574][ C0] ? hhf_dequeue+0x68b/0xa20 [ 1515.796026][ C0] __qdisc_run+0x1e7/0x19d0 [ 1515.800530][ C0] ? dev_queue_xmit+0x18/0x20 [ 1515.805202][ C0] __dev_queue_xmit+0x16f1/0x37c0 [ 1515.810229][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1515.816407][ C0] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 1515.821680][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1515.828021][ C0] ? br_nf_post_routing+0xd73/0x1d30 [ 1515.833506][ C0] ? br_forward_finish+0x235/0x400 [ 1515.838628][ C0] ? find_held_lock+0x35/0x130 [ 1515.843860][ C0] ? br_forward_finish+0x235/0x400 [ 1515.849384][ C0] dev_queue_xmit+0x18/0x20 [ 1515.853881][ C0] ? dev_queue_xmit+0x18/0x20 [ 1515.858566][ C0] br_dev_queue_push_xmit+0x3f3/0x5e0 [ 1515.863928][ C0] ? __kasan_check_read+0x11/0x20 [ 1515.869209][ C0] br_forward_finish+0xfa/0x400 [ 1515.874054][ C0] ? br_dev_queue_push_xmit+0x5e0/0x5e0 [ 1515.880367][ C0] ? br_fdb_add.cold+0x83/0x83 [ 1515.885120][ C0] ? __kasan_check_read+0x11/0x20 [ 1515.890153][ C0] __br_forward+0x641/0xb00 [ 1515.894641][ C0] ? br_forward_finish+0x400/0x400 [ 1515.899746][ C0] ? br_dev_queue_push_xmit+0x5e0/0x5e0 [ 1515.905635][ C0] deliver_clone+0x61/0xc0 [ 1515.910297][ C0] maybe_deliver+0x2c7/0x390 [ 1515.914874][ C0] br_flood+0x13a/0x3d0 [ 1515.921103][ C0] br_dev_xmit+0x98c/0x15a0 [ 1515.925682][ C0] ? br_poll_controller+0x10/0x10 [ 1515.930786][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1515.936922][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1515.942453][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1515.948437][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.955482][ C0] dev_hard_start_xmit+0x1a3/0x9c0 [ 1515.960597][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.966840][ C0] __dev_queue_xmit+0x2b82/0x37c0 [ 1515.971866][ C0] ? __kasan_check_read+0x11/0x20 [ 1515.977323][ C0] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 1515.982770][ C0] ? __kasan_check_read+0x11/0x20 [ 1515.987791][ C0] ? mark_lock+0xc2/0x1220 [ 1515.992201][ C0] ? mark_held_locks+0xa4/0xf0 [ 1515.997028][ C0] ? ip6_finish_output2+0xc40/0x2550 [ 1516.002302][ C0] ? __ip6_finish_output+0x444/0xaa0 [ 1516.008726][ C0] ? ip6_finish_output2+0xc40/0x2550 [ 1516.014019][ C0] dev_queue_xmit+0x18/0x20 [ 1516.018525][ C0] ? dev_queue_xmit+0x18/0x20 [ 1516.023193][ C0] ip6_finish_output2+0xf58/0x2550 [ 1516.028738][ C0] ? ip6_forward_finish+0x570/0x570 [ 1516.033929][ C0] ? lock_downgrade+0x920/0x920 [ 1516.038767][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1516.044992][ C0] ? __kasan_check_read+0x11/0x20 [ 1516.050005][ C0] __ip6_finish_output+0x444/0xaa0 [ 1516.055569][ C0] ? __ip6_finish_output+0x444/0xaa0 [ 1516.061207][ C0] ip6_finish_output+0x38/0x1f0 [ 1516.066050][ C0] ip6_output+0x235/0x7f0 [ 1516.070380][ C0] ? ip6_finish_output+0x1f0/0x1f0 [ 1516.075481][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1516.081620][ C0] ? __ip6_finish_output+0xaa0/0xaa0 [ 1516.087064][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 1516.093021][ C0] ndisc_send_skb+0xf29/0x14a0 [ 1516.097870][ C0] ? nf_hook.constprop.0+0x560/0x560 [ 1516.103153][ C0] ? memcpy+0x46/0x50 [ 1516.107121][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1516.113345][ C0] ndisc_send_ns+0x3a9/0x850 [ 1516.118008][ C0] ? ndisc_netdev_event+0x4e0/0x4e0 [ 1516.123194][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1516.129432][ C0] rt6_probe_deferred+0xe3/0x1a0 [ 1516.134364][ C0] ? __ip6_ins_rt+0x80/0x80 [ 1516.139536][ C0] ? trace_hardirqs_on+0x67/0x240 [ 1516.144566][ C0] process_one_work+0x9af/0x1740 [ 1516.149487][ C0] ? __schedule+0x776/0x17a0 [ 1516.154070][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1516.159432][ C0] ? lock_acquire+0x190/0x410 [ 1516.164540][ C0] worker_thread+0x98/0xe40 [ 1516.169035][ C0] ? trace_hardirqs_on+0x67/0x240 [ 1516.174153][ C0] kthread+0x361/0x430 [ 1516.179253][ C0] ? process_one_work+0x1740/0x1740 [ 1516.184460][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1516.190963][ C0] ret_from_fork+0x24/0x30 [ 1520.409074][T11002] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10954 jiffies s: 3253 root: 0x1/. [ 1520.428820][T11002] rcu: blocking rcu_node structures: [ 1520.434148][T11002] Task dump for CPU 0: [ 1520.438293][T11002] kworker/0:3 R running task 26136 8961 2 0x80004008 [ 1520.453110][T11002] Workqueue: events rt6_probe_deferred [ 1520.458676][T11002] Call Trace: [ 1520.464789][T11002] ? process_one_work+0x9af/0x1740 [ 1520.474823][T11002] __schedule+0x776/0x17a0 [ 1520.481927][T11002] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1520.487332][T11002] ? lock_acquire+0x190/0x410 [ 1520.496998][T11002] ? worker_thread+0x98/0xe40 [ 1520.504359][T11002] ? trace_hardirqs_on+0x67/0x240 [ 1520.514299][T11002] ? kthread+0x361/0x430 [ 1520.518556][T11002] ? process_one_work+0x1740/0x1740 [ 1520.526450][T11002] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1520.537557][T11002] ? ret_from_fork+0x24/0x30